AWS Outage: How to Protect Your Organization in the Future

AWS OutageAs most people know, Amazon Web Services, commonly known as AWS, experienced a major outage this week.

This outage caused an unknown amount of websites and apps to break for roughly 11 hours on Tuesday, Feb 28th. 

If you’re reading this, you fully understand what 11 hours of downtime could (or has) cost your company. Possibly even worse is the feeling of complete and utter helplessness caused by this outage. AWS is a gigantic organization, and as such, can’t be expected to communicate one on one with every company they sell web hosting space to.

But what can you do to protect your organization from outages like this one in the future?

Having backups of all data is critical, but it’s likely that if AWS is your go-to for hosting your mission-critical data, you don’t have the equipment on-site to do this. In this case, it’s a good idea to hire a managed services partner.

Among many other things, a partner like ColoCrossing will be able to protect you from such outages by replicating your site on a regular basis so that you can quickly deploy a backup on a server that’s not affected by the outage.

The fact is that outages come in all shapes and sizes. Having a clear and easily deployable Disaster Recovery Plan is essential for any business that relies on off site data storage.

If you’re ready to learn more about how ColoCrossing can help you avoid outages, you can request more information here.

Using Docker on Ubuntu 16.x for WordPress Development

Today, I’m going to show you how you can set up Docker on your Ubuntu PC and start using it for WordPress development. Along the way, I’ll show you why you would want to do that. Then I’ll dive into the details and share step-by-step instructions.

So, why bother using Docker? After all, you could get by with a text editor and an FTP client.

That’s the approach I used when I first got into WordPress development. Back then, I would edit files on my own computer and upload them to the server. I’d do all my testing on the remote machine, on a separate WordPress installation. Continue reading

Virtual Reality – More Than Just Fun and Games?

virtual reality

It should be obvious that Virtual Reality (VR) technology has officially take off in the past few years. There are countless VR headsets available, ranging in price from $15 (see Google Cardboard) to $800 (HTC Vive). One thing you’ll notice about most of these sets is that they’re marketed as toys; a way to play games or enjoy a walk on a sandy beach during a sunset.

And this makes sense, because ever since the concept of VR has existed, we’ve connected it with entertainment. In fact, the concept itself didn’t come from an engineer or inventors drawing board. Probably the first example of VR that we can find comes from a 1935 Science Fiction novel called “Pygmalion’s Spectacles”, by Stanley G. Weinbaum. Continue reading

Debunked: 5 Common Myths of Data Center Colocation 

colocationSome organizations may dismiss data center colocation as an expensive alternative to hosting your infrastructure onsite. Others might incorrectly assume that data center colocation is less reliable than hosting your servers in the cloud.

In this article, we’ll look at 5 common myths that have been perpetuated about data center colocation. To combat these myths, we’ll provide facts that will help you gain a clear picture of how data center colocation can provide unrivaled network uptime, network reliability and physical security for your servers. Continue reading

What is IPS/IDS and Why Does My Enterprise Need It? 

IPS/IDSNetwork security continues to trend as one of the hottest topics in enterprise computing. Many network administrators rely on IPS and IDS as their first lines of defense against attacks. You’re probably wondering, what is IPS/IDS and how can it help increase my network’s security?

  • IPS is short for Intrusion Prevention Services and this typically operates within your firewall to prevent malicious traffic from traversing across your network.
  • IDS is short for Intrusion Detection System and this service provides administrators with insights on policy violations and malicious activity on the network.

Continue reading

The Best Network Monitoring Tools for 2017  

network monitoring toolsOrganizations must maximize their uptime in order to stay competitive in the digital world. When your business hosts its infrastructure in a colocated data center, your network administrators will use network monitoring tools to ensure that your colocation provider is living up to their end of the bargain.

Did you know that network downtime costs US based businesses over $700 billion per year? A report by IHS breaks down the specific costs associated with network downtime as well as the main causes for network outages. Continue reading

5 Reasons to Colocate your VoIP Infrastructure












VoIP provides businesses with a cost effective method of deploying telephony and unified communication services to end users. When compared to a traditional PBX infrastructure, VoIP provides cost savings, flexibility and increased reliability.

According to Sipnology, 31% of all businesses currently use Voice over IP in their environments. Research analysts predict that the VoIP and Unified Communications (UC) industry will grow to become an $88 billion dollar market by 2018. Continue reading

How to Build Your Own Web Crawler Using an Ubuntu VPS

web crawler










If you want to learn how to build your own web crawler using a VPS, have you considered using Scrapy? In this installment of ColoCrossing Tutorials, we’ll go over the basic functions of the Scrapy web crawling app.

Scrapy is an open source application that is used to extract data from websites. Its framework is developed in Python which enables your VPS to perform crawling tasks in a fast, simple and extensible way. Continue reading

How to Strengthen the Security of MySQL on your VPS

mysqlSecurity is a critical component of any database application. Did you know that a default MySQL installation can leave your database vulnerable to cyber threats?

There several different implementations of the SQL database available on Linux and UNIX systems. MySQL and MariaDB are the most popular options for deploying relational databases in server environments. Continue reading