416.235.0931 | 1.866.408.2737 | info@infinitynetwork.com

Archives

3
Nov

Cloud computing; making offices obsolete?

Cloud Computing; convert the LAN room into office space. For many small to medium size businesses, server rooms can become a thing of the past. The spaces LAN rooms occupy could mean up to a few hundred square feet that could be used for storage, utility, or even an executive’s office. The enormous cost savings …

4
Jul

Data Protection and Security

  Data Protection Protecting sensitive data is the end goal of almost all IT security measures. Two strong arguments are; to avoid identity theft and to protect privacy. The improper disclosure of sensitive data can also cause harm and embarrassment and potentially harm the reputation of the Organization. It is to everyone’s advantage to ensure that sensitive data …

28
Jun

What is your data strategy?

Data growth today is so massive it is staggering. According to Gartner*, in the last minute there were 204 million emails sent, 61,000 hours of music listened to on Pandora, 20 million photo views and 3 million uploads to Flickr, 100,000 tweets, 6 million views and 277,000 Facebook logins, and 2 million plus Google searches. Every day, …

13
Jun

Enterprise customers’ indicate System x® hardware quality and support services are the key differentiators that separate IBM from the the competition.

Enterprise customers view IBM as a trusted partner and provider of x86 hardware and support services. The increased usage of virtualization in server environments and private, public and hybrid cloud computing architectures intensifies the requirements of its System x® solutions. These technology trends play a significant role in the growing amount of mission- and business-critical data streaming through server hardware …

3
Jun

Why Should You Protect Your Data?

                Sooner or later – by mischief, misfortune or mistake – it is statistically likely that you will lose precious data. A 2007 Carnegie Mellon study indicated that 2 to 4% of hard drives have to be replaced every year. That’s just one indication of the threat from …

14
May

Weak Authentication is a seasoned hackers dream

                Many companies implement elaborate and effective security policies to protect from a “perimeter breach” the network in effect, but neglect to implement strong policies in order to protect the corporate jewel, the database. In most cases the password is the gate to entering the database, the security …

23
Feb

Cloud Computing – How it can drive your business forward

Written By: Caitlyn Young www.essentialdata.ca Cloud Computing – A model for delivering information technology  services in which resources are retrieved from the internet through web-based tools and applications, rather than a direct connection to a server. Data and software packages are stored in servers. However, cloud computing structure allows access to information as long as …

17
Feb

Remote Backup VS Tape Backup

Written By: Caitlyn Young www.essentialdata.ca 93% of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. 50% of businesses that found themselves without data management for this same time period filed for bankruptcy immediately. (National Archives & Records Administration in …