Microsoft SQL Server Log Shipping
Log shipping is an inexpensive and powerful method for increasing database availability. Log Shipping is a feature of Microsoft SQL Server in which recorded changes to a database (transaction logs) are automatically transferred and executed on a secondary database server. In the event that the primary database becomes unavailable, the secondary database server can be quickly promoted to the primary server role to resume service until the primary server is restored. The ability to move database changes in real time from one database to another is not unique to Microsoft SQL Server. Log shipping is simply Microsoft’s implementation of the concept.
BALTIMORE, Maryland (October 2014) – Edgewebhosting Inc. a leader in highly available managed cloud hosting and dedicated server hosting services, announced today that it has been named to the 2014 CRN Fast Growth 150 list. The Fast Growth 150 list recognizes those solution providers that have been the fastest growing over a two-year period based on gross revenue from calendar year 2011 to calendar year 2013. These solution providers have demonstrated exceptional business finesse in order to thrive despite a turbulent IT economy.
An advisory (CVE-2014-6271) has been released regarding a newly discovered bug affecting Linux-Based system GNU Bash, also known as the Shellshock bug or vulnerability. According to research, the bug could be used to remotely take control of a system that uses Bash, which is a component of many Linux systems. For additional information, please view the following: https://access.redhat.com/articles/1200223. Microsoft Windows is not affected by this vulnerability. Continue reading
Baltimore, Maryland (September 2014) – Edgewebhosting Inc., a leader in highly available and secured managed cloud hosting services, today announced it has received an Authorization to Operate (ATO) from the U.S. Department of Labor (DOL). The ATO is a declaration that Edgewebhosting CloudPlus Secure Cloud Infrastructure has met the Federal Risk and Authorization Management Program (FedRAMP) Cloud Service Provider (CSP) requirements. Continue reading
BALTIMORE, MD (August 2014) – For a fourth year in a row, Edgewebhosting Inc., a leader in highly available managed cloud hosting and dedicated server hosting services has been named to the exclusive 2014 Inc. 5000 list of fastest-growing companies in the United States. The list represents the most comprehensive look at the most important segment of the economy—America’s independent entrepreneurs. The prestigious Inc. 5000 selects and ranked companies based on revenue growth from 2010 to 2013, during which Edge has grown 130 percent.
A key driver of application uptime is storage performance. Using storage is not enough; it is important to understand how well it is working. Until now, it has been very difficult for managed hosting vendors to provide customers real-time visibility and storage analytics for mission critical storage resources on a per volume basis.
That changes today. To ensure that “You see what we see”, the Edge team is excited to announce the release of a new and unique feature in the Customer Portal which allows for near real-time visibility into the performance of your mission critical managed storage.
Shared storage is a NAS (Network Attached Storage) device that acts as repository of shared file data. In essence, it is a large, redundant, high performance file server.
Let’s discuss some different options for clustered file storage.
There is a new vulnerability in previous versions of WordPress and Drupal that can allow a denial of service attack which ramps up the memory on the server and maxes out resources. This has been fixed in the latest versions of the respective pieces of software. Continue reading
Another month, another big data breach. In case you haven’t heard, there’s news that 1.2 billion logins were stolen by a Russian cyber group. Hold Security, the group that reported the breach, isn’t forthcoming in the details as to who or what services are affected due to non-disclosure agreements on their end. They do offer a service to check if your password was stolen but even then, the form appears to be asking for your passwords which they will then hash using SHA-512 and compare that against the database they have reportedly obtained. Continue reading
In April 2014, Heartbleed and OpenSSL were in the news. From technologists to grandmothers everywhere, everyone was talking about Heartbleed. The good news is that the attention led to a significant number of eyes and scrutiny on code around OpenSSL. Continue reading