Many major internet sites were slow or entirely downed on Friday thanks to at least two Distributed Denial of Service attacks, according to Engadget. The first attack came Friday morning at 7:10 a.m. and affected Dyn, one of the major domain name systems of the internet. Affected sites included Twitter, Spotify, Reddit and The New York Times. Dyn claimed to have everything back up and running, but another attack hit at about 12 p.m., causing Twitter to shut down entirely …

Online Tech recently hosted a webinar on virtual private clouds and how they help your business. Our panelists were Aaron Lake, senior solutions architect, and Kurt Schaldenbrand, product design manager. Together, they have more than 40 years of experience designing and building applications for a variety of platforms and were happy to lend their expertise. Schaldenbrand and Lake gave a comprehensive overview of Online Tech’s virtual private cloud offering and how the easy self-serve options within the client portal, OTPortal, …

Docker has become quite a popular subject lately, with more and more businesses adopting it across industries. So what is Docker, and why is everyone talking about it? To answer that question, we must first go into containers. They are a type of virtualization technology, with their own CPU, memory and resources like a virtual machine. The difference, though, is that containers share the kernel (the brain) of the host operating system and don’t need a guest operating system. Since …

Online Tech’s latest stop during its time in Indiana was the Indy Big Data conference, held on Sept. 1. The aim of the conference was to grow and learn within the big data field and prepare for the exponential amounts of data that are being created with the Internet of Things (IoT). The conference was called “The Tipping Point,” and according to the Big Data website, leaders wanted to focus on “creating a big data culture of success and exploring …

Online Tech was onsite at the Data Connectors Indianapolis conference last week, and it was a big success. There were many different speakers at the event, including our own Nick Lumsden, who talked about data security, protecting your assets and tips on garnering buy-in from your executives and boards. In his presentation, Nick discussed the average duration of an attack (243 days) and the average response time from organizations (four or five days for world-class organizations, but typically much longer). …

After Safe Harbor, the international data transfer law used by the U.S. and the European Union, was invalidated in October 2015, the Department of Commerce and the EU Commission worked to draft a new agreement that gave Europeans more rights about their personal information in the U.S. On July 12, the EU-US Privacy Shield law was passed. Why did this agreement come about in the first place? When the EU Court of Justice ruled Safe Harbor invalid, it had two …

There is a fundamental shift happening to IT right now, and it’s changing the way we think about the department: IT as a Service. What is it? It’s an organizational model that corporate and internal IT departments must recognize and adapt to or risk falling behind the curve. But how has this concept revolutionized the industry? Internal IT has changed because its role in business has changed–drastically. Historically, IT has been viewed as a cost center, slow to respond, and …

The European Commission has announced the new EU-US Privacy Shield law, which replaces Safe Harbor effective immediately. The new ruling addresses European concerns about US access to the data of Europeans and gives Europeans more options to file concerns regarding the use of their data. U.S. companies may certify compliance beginning Aug. 1. Tech companies praised the new agreement, saying it restores trust that’s needed after the Edward Snowden leaks of 2013. “Our members are ready to implement the new …

Recently, Yan Ness and Bill Frohriep of Online Tech held a thought leadership event with a dozen business and IT executives at the Grosse Pointe Yacht Club. The main topic on the agenda was Shadow IT, or “IT behind the scenes.” Shadow IT refers to companies who implement IT projects without the department’s knowledge (or permission, in some cases), usually because the internal IT department is too slow or doesn’t have enough resources to respond to requests. An example of …

Ransomware has been rising at an “alarming rate,” according to security researchers, with a 3,500 percent increase in criminal use of net infrastructure that helps run ransomware campaigns. According to Microsoft, the U.S. has the highest number of ransomware attacks, with more than 300,000. It can affect anyone with a computer or mobile device, and there are already plenty of examples of large businesses, especially healthcare, being victimized and shelling out large amounts of money to get their data back. How does …

Get started now. Exceptional service awaits.

Live Chat