Containers and Docker in a nutshell

Posted on September 8, 2016 by

Docker has become quite a popular subject lately, with more and more businesses adopting it across industries. So what is Docker, and why is everyone talking about it? To answer that question, we must first go into containers. They are a type of virtualization technology, with their own CPU, memory and resources like a virtual machine. The difference, though, is that containers share the kernel (the brain) of the host operating system and don’t need a guest operating system. Since …

Indy Big Data conference takeaways

Posted on September 6, 2016 by

Online Tech’s latest stop during its time in Indiana was the Indy Big Data conference, held on Sept. 1. The aim of the conference was to grow and learn within the big data field and prepare for the exponential amounts of data that are being created with the Internet of Things (IoT). The conference was called “The Tipping Point,” and according to the Big Data website, leaders wanted to focus on “creating a big data culture of success and exploring …

Online Tech was onsite at the Data Connectors Indianapolis conference last week, and it was a big success. There were many different speakers at the event, including our own Nick Lumsden, who talked about data security, protecting your assets and tips on garnering buy-in from your executives and boards. In his presentation, Nick discussed the average duration of an attack (243 days) and the average response time from organizations (four or five days for world-class organizations, but typically much longer). …

Virtual private clouds are a hot ticket these days—everyone wants them. We know they aren’t the same as a fully private cloud. But do the differences extend to security, too? Let’s start by reviewing the differences between private and virtual private clouds. If you want your environment completely dedicated to you and to own everything, a private cloud is for you. The equipment will be on a site or data center you own, so you have total control over your infrastructure. …

After Safe Harbor, the international data transfer law used by the U.S. and the European Union, was invalidated in October 2015, the Department of Commerce and the EU Commission worked to draft a new agreement that gave Europeans more rights about their personal information in the U.S. On July 12, the EU-US Privacy Shield law was passed. Why did this agreement come about in the first place? When the EU Court of Justice ruled Safe Harbor invalid, it had two …

There is a fundamental shift happening to IT right now, and it’s changing the way we think about the department: IT as a Service. What is it? It’s an organizational model that corporate and internal IT departments must recognize and adapt to or risk falling behind the curve. But how has this concept revolutionized the industry? Internal IT has changed because its role in business has changed–drastically. Historically, IT has been viewed as a cost center, slow to respond, and …

The European Commission has announced the new EU-US Privacy Shield law, which replaces Safe Harbor effective immediately. The new ruling addresses European concerns about US access to the data of Europeans and gives Europeans more options to file concerns regarding the use of their data. U.S. companies may certify compliance beginning Aug. 1. Tech companies praised the new agreement, saying it restores trust that’s needed after the Edward Snowden leaks of 2013. “Our members are ready to implement the new …

Recently, Yan Ness and Bill Frohriep of Online Tech held a thought leadership event with a dozen business and IT executives at the Grosse Pointe Yacht Club. The main topic on the agenda was Shadow IT, or “IT behind the scenes.” Shadow IT refers to companies who implement IT projects without the department’s knowledge (or permission, in some cases), usually because the internal IT department is too slow or doesn’t have enough resources to respond to requests. An example of …

Ransomware has been rising at an “alarming rate,” according to security researchers, with a 3,500 percent increase in criminal use of net infrastructure that helps run ransomware campaigns. According to Microsoft, the U.S. has the highest number of ransomware attacks, with more than 300 thousand. It can affect anyone with a computer or mobile device, and there are already plenty of examples of large businesses being victimized and shelling out large amounts of money to get their data back. How does ransomware …

Online Tech CEO Yan Ness will be speaking at the Fifth Annual Chicago and Midwest Data Center Summit this week! He is part of a panel that will be speaking on topics such as the role monetization has played in data centers, how the cloud affects the data center, and how enterprises view the retail data center with the advances in cloud computing and the Internet of Things. The conference will take place today and tomorrow at the Westin Hotel River North …

Get started now. Exceptional service awaits.

Live Chat