5 ADDITIONAL Benefits of Cloud Services

Brian Wood Blog

Just in case the “original” five benefits of cloud computing were not enough… …here are five more “unexpected benefits” that tag along with cloud adoption. Article by Joe McKendrick in Forbes. Emphasis in red added by me. Brian Wood, VP Marketing ———- 5 Cloud Benefits You Aren’t Likely To See In A Sales Brochure Cost savings… elasticity….  scalability….  load “bursting”….  …

Managed CyberSecurity White Paper (1 of 3)

Brian Wood Blog

Cybersecurity is a hot topic, right? Snowden. Manning. WikiLeaks. NSA. Ugh. It’s inescapable: Internet. TV. Radio. Cocktail parties. There’s no avoiding reality. What to do? AIS commissioned Matthew McCormack — one of the most noteworthy, experienced cybersecurity experts on the planet — to write a whitepaper and deliver a webinar on what YOU can do to protect your business. Mr. …

A New Twist on Cruisin’ Cars

Brian Wood Blog

Got CyberAutoSecurity? AP article by Tom Krisher. Emphasis in red added by me. Brian Wood, VP Marketing ——– Hackers find weaknesses in car computer systems DETROIT (AP) — As cars become more like PCs on wheels, what’s to stop a hacker from taking over yours? In recent demonstrations, hackers have shown they can slam a car’s brakes at freeway speeds, …

AIS Infographic: How Much Data Is Stored in the Human Body?

Brian Wood Blog

This just in — the latest AIS infographic! The human body is more powerful than the world’s fastest sports car. It adapts to its surroundings, it processes information on the fly, and it is unique to only one individual in the whole entire world. But it doesn’t stop there.  The human body is able to store an enormous amount of …

AIS + QuoteColo = Great Deals in San Diego & Phoenix

Brian Wood Blog

AIS and QuoteColo (http://www.quotecolo.com/colocation-pricing/) are offering some GREAT deals for new customers in San Diego and Phoenix. Take a look at the AIS colocation deals in San Diego:AIS Fiber Alley is located in the San Diego Spectrum area of Kearny Mesa in central San Diego. [divider] Here are the AIS colocation deals in Phoenix:AIS Van Buren is in a well-known, …

Cyber Crime and Security: Sophistication Escalation

Brian Wood Blog

Staying one step ahead of the bad guys is a never-ending endeavor. Pessimists would claim that we are already behind and will always be behind because of the ever-expanding sources and sophistication of threats. And as long as we all keep trying to handle cyber security ourselves, I agree that we’ll get and stay behind. [But there’s another option, too: …

What Do 0000, 1111, 1234 Have in Common?

Brian Wood Blog

Quick reader poll: Who has a passcode for your mobile device(s)? 15% of you will say “not me”. Of the rest, 10% of you use “0000” or “1111” — and another 10% of you use “1234”. Really, it’s true. Read below to learn even more. Summary article by Derek C. Slater in FierceITSecurityy, original by Kelly Jackson Higgins in Dark …

Compliance: Necessary But Not Sufficient (for Security)

Brian Wood Blog

Compliance is (or should be) a big dang deal for data center service providers. But it’s also important to note that compliance is not nearly sufficient to ensure security. It’s like having a lock on the window: it’s great that you have one, but do you always use it when your window is closed? And what do you do to …

Outsourcing Security: It’s Practical, Not Heresy

Brian Wood Blog

In the perfect world we would have enough time, money, and intellectual energy to do everything (that we care about) ourselves. Get real and face the fact that no amount of working hard to “catch up and get ahead” will ever get you (or me) anywhere near where we’d need to be to do it all. But we do have …

How Much Can an NSA Data Center Store?

Brian Wood Blog

Truly, the summary and the original articles say it all. Summary by Pam Baker in FierceBigData, original by Sharon Fisher in IT Knowledge Exchange. Emphasis in red added by me. Brian Wood, VP Marketing ——— Experts calculate storage capacity of an NSA data center After all the leaks that spell out just how much data the NSA is collecting from, …