AI, IoT, and the hybrid cloud: the triumvirate of IT’s future

    Jennifer Fitzgerald, CopywriterOctober 16, 2017

    Hostway president and CEO Emil Sayegh hosts a thought leadership blog on InfoWorld’s website. The column is named “On the Edge of the Cloud” and discusses the latest in cloud computing trends, Internet of Things developments, and other cool and relevant tech topics. This month, Emil reflects on the future of AI, IoT, and the

    5 Ways to Get Involved in Cyber Security Awareness Month

    Jennifer Fitzgerald, CopywriterOctober 04, 2017

    October is National Cyber Security Awareness Month (NCSAM). Taking the time to learn about cybersecurity, and how you can protect yourself and your business should be of the utmost importance. It’s an especially important time as breaches and leaks continue to grow and are a major part of our online lifestyle. It doesn’t matter how

    Dip a Toe in the Cloud: How to Address the Challenges of a Cloud-First Strategy

    Brittany Wilson, COPYWRITER November 07, 2016

    Cloud technology has been widely available for several years now, and there’s no arguing the benefits of these environments. As the cloud continues to bring considerable advantages for everyone from employee users to a company’s IT team, it’s no surprise that business leaders are increasingly implementing a cloud-first strategy within their organization. Defining Cloud-First But

    Why Your Business Needs Dedicated Hardware

    Nikole Haiar, March 01, 2016

    If your organization is beginning to feel the constraints of a shared environment, it might be time to upgrade to dedicated hardware. 

    Running SQL 2005 on Your Own Servers? Consider a Move

    Nikole Haiar, February 16, 2016

    Nearly every business runs some kind of database – it’s a basic, mission-critical application, and its performance, security and availability are essential to the function of the companies that use them. A significant number of those databases run on Microsoft SQL Server 2005 – a stalwart application that’s going end-of-life on April 12. What’s this

    Google Sets Timeline for Removing Flash Ads

    Nikole Haiar, February 11, 2016

    Adobe Flash’s demise has long been heralded, but concrete signs are starting to appear – none more significant than Google’s new announcement on its AdWords blog that Google display ads will go entirely to HTML5 within a year. What is the plan for Flash? Google announced Tuesday that AdWords and related services will no longer accept

    Update: 191 Million US Voter Records Accessible Via Unsecured Database

    Nikole Haiar, January 01, 2016

    If you’ve voted in a national American election since 2000, your name, street address, phone number, date of birth and more may be found in an unsecured, 300 GB database brought to public attention by Austin-based IT specialist Chris Vickery. Vickery, who in September drew attention to a leak of 1.5 million medical records, reported the database

    .PRO Domains Now Available to All

    Nikole Haiar, November 10, 2015

    Thanks to an upcoming regulatory change, all websites will have the opportunity to go pro. Beginning on the effective date of November 16, 2015, .PRO will become an unrestricted TLD open to all registrants. This change is a result of the renewal of the .PRO registry agreement under new terms recently entered into between the

    Windows 10: A More Human Way to Upgrade

    Nikole Haiar, August 06, 2015

    Is Microsoft  Windows 10 a hit or miss? Despite the over 14 million downloads it produced within the first 24 hours of its launch, the jury is still out. While Microsoft has clearly put in the effort to step up its game, there are both positives and negatives associated with this operating system upgrade. With

    Android Flaw Allows Hack via Text

    Nikole Haiar, July 28, 2015

    An android flaw currently unpatched by major manufacturers would allow hackers to break into your phone without any mistake on your part. The Stagefright vulnerability impacts 95 percent of existing Android devices – numbering nearly 1 billion phones and other equipment – via multimedia messaging. A malware video file would be processed immediately upon receipt – you won’t