Oxford Economics Research Shows Business’ Expectations Increase as a Result of Cloud Adoption

Posted by: Admin  :  Category: Web Hosting News

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

Oxford Economics and Windstream published a study of cloud technology, adoption and value. Their work shows that cloud adoption is having quite a strategic impact on U

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

The post Oxford Economics Research Shows Business’ Expectations Increase as a Result of Cloud Adoption appeared first on Web Hosting Talk News.

Web Hosting Talk News

Linux Cpanel shared hosting: 600 GB disk space, 6 TB bandwidth, free domain, unlimited databases and ftp accounts, web hosting cheap and pro at Hostony

HIPAA Compliance and Security Top Cloud Adoption Concerns for US Healthcare Providers

Posted by: Admin  :  Category: Web Hosting News

Over 80 percent of healthcare organizations are currently using cloud services, mostly in SaaS form, according to a recent report by the Healthcare Information and Management Systems Society (HIMSS).

The post HIPAA Compliance and Security Top Cloud Adoption Concerns for US Healthcare Providers appeared first on Web Hosting Talk News.

Web Hosting Talk News

Nigeria Internet Registration Association Offers Free ccTLDs to Encourage .ng Domain Adoption

Posted by: Admin  :  Category: Web Hosting News

The Nigeria Internet Registration Association, the body that manages the .ng country code TLD, has announced plans to give out 100,000 free domain names to Nigerians in 2014.


Web Hosting Talk News

Bring Your Own Device (BYOD): #8 Tips From the Field For a Successful BYOD Adoption

Posted by: Admin  :  Category: Web Hosting

Last week we have received a support request telling that a user is being locked from the Active Directory continuously. We turned to the user (who was very annoyed) and asked her about any mobile phone or tablet that she may be using that has the corporate email account defined. She told us that she used to be using a Nokia feature phone but she has switched to iPhone and not using the Nokia anymore. We kept that and began investigating the issue by the logs and saw that she was receiving “bad password” error in every five minutes with +/- 15 seconds of difference. Digging deeper, we saw that the bad password was coming from the Exchange Server, logs directing to the hardware load balancer. When we took a network capture from the load balancer. We have narrowed to log to the second that the account received a bad password error from the Active Directory to see the IP address that made the connection. And voila! The IP address that we found belonged to an IP from a mobile carrier. Once again we turned to the user and told that a device that belonged to her, connected to that mobile carrier is trying to connect with a wrong password. She told us that she had given her Nokia phone to the repair shop and most probably the shop is testing the phone. Ticket is closed.

The whole process showed us one thing: not having a Bring-Your-Own-Device is an invitation for a disaster and not taking the necessary steps is insisting on having a disaster. This support request could easily turn to be a crisis and even downtime. As I have discussed thoroughly in the article series, these disasters can be avoided.

Before rolling out the BYOD policies, make sure that you reevaluate your existing infrastructure. This includes password change policy, existing devices that will handle the additional load which will come from the employees’ devices, firewalls etc.. Consumer-grade devices will not be able to cope with the new devices’ loads: wireless access points will serve more devices, servers will answer more queries and switches, routers and firewalls will handle more traffic. Also the network bandwidth has to be upgraded.

Supported devices and the platforms and the level of support has to be clearly defined. At one point, you will inevitably find yourself trying to cope with various Windows and Mac OS releases, Linux Distributions, iOS, Android, BlackBerry versions, ChromeOS and God knows what else. Also you are not guaranteed that the users will be using the default applications; for example what will your answer be if a user opens a ticket that says he cannot sync his Google calendar with the company’s Exchange calendar using a third-party calendaring application on a supported Android release? Limit supported devices and supported applications. Or go mad.

Next on the list is employee training, which I have spoken extensively in my previous article. The training can turn out to be a “BYOD 101” class, but it is necessary. In terms of user/device security, keeping antimalware applications updated, keeping their data secure on untrusted networks and various other security issues should be clearly communicated. The users should be reminded that failing to comply with these could expose all the enterprise network to exploits. It is easy to train the users in advance rather than dealing with the aftermaths of a breach later.

Requiring device registration is a must. A simple registration form asking the device make, model, MAC address, mobile carrier and the user is enough. Considering the case above, with this information, we could easily figure out the device itself. Considering the overall infrastructure, this information would help us track the users who are bringing their devices, who are abusing the policy, block offending users and even block the devices.

As I have told in the second article in the series, BYOD is a swift revolution and it is not possible to stand against it. It is not time for the administrators to complain about the incoming devices and the anticipated headaches. It is time for the management to sit down, understand the BYOD trend and take the necessary steps to lessen the load both on the users and the IT personnel. With these tips, I cannot say that your company’s BYOD adoption will be painless, but I can guarantee that following these tips will lessen the pain.

Web Hosting Geeks’ Blog

Governments Must Step Up to Increase Cloud Adoption in Low- and Middle-Income Countries: Report

Posted by: Admin  :  Category: Web Hosting News

The United Nations released a new report on Tuesday that examines the economic potential of cloud computing for low- and middle-income countries, where rates of cloud adoption are currently low.


Web Hosting Talk News

Cloud Adoption Survey 2012 and Its Inferences : Infographics

Posted by: Admin  :  Category: VPS / Dedicated Servers

We at WHUK have been constantly coming up with innovative services and solutions that are tailored for small and medium sized businesses with the view to help you raise your business to higher grounds. And we are happy to say … Continue reading

(Visited 1 times, 1 visits today)

Web Hosting UK Blog | Dedicated Servers VPS Hosting Technology Updates