Atlantic.Net Blog

Side-Stepping the Roadblock: Linking Cloud Computing to Legacy Infrastructure

Almost four out of every five IT decision-makers feel hemmed in by traditional computing systems, according to a recent survey. Companies that want to move confidently into the future – at least for now – must figure out how best to integrate their legacy architectures with the cloud.

Read More


Ensuring Cloud Compliance In Regulated Industries

  • Why is Cloud Computing Worth the Effort for Regulated Companies?
  • What Are You Up Against?
  • What Can You Do to Adopt Cloud Effectively?
  • Partners that Understand Compliance

The businesses that run into the most difficulties when transitioning to cloud computing solutions are those that are strictly regulated, such as finance and healthcare. What are the challenges? How can they be overcome? And why is the effort worth it?

Let’s start with the last of those questions.

Read More


How Cloud Computing Will Enable Businesses To Harness The Internet of Things

You may have heard last year that General Electric was completely committing itself to the public cloud. This really was a major announcement just for the sheer size, prominence, and historical success of GE. General Electric tech COO Chris Drumgoole remarked that more than nine out of every ten applications deployed by the corporation throughout 2014 were built and released via cloud computing.

“If you look at our new apps, north of 90 percent of what we deployed this year has gone into a public cloud environment,” Drumgoole explained. “We still have a lot of old stuff that hasn’t moved yet, but if you look at our new stuff, we’re there.”

Read More


Update on VENOM (CVE-2015-3456) QEMU Vulnerability

Earlier today, a security vulnerability, CVE-2015-3456 (VENOM), was publicly announced. This vulnerability affects the widely used KVM/QEMU virtualization hypervisor platform that we use to power our Cloud Servers.

We are rolling out the necessary security patches to address this vulnerability to all applicable infrastructure. In order to ensure that the patches are effective at resolving the vulnerability, you may see a very brief interruption in service (a few seconds) while your Cloud Server is switched to run on the updated version of our infrastructure.

A very small percentage of Cloud Servers may require a reboot to complete this process. If this is necessary for one of your Cloud Servers, you will be contacted by our support team so this can be done with as little inconvenience as possible.

We will keep you posted on progress.

 

UPDATE 05/14/15: Atlantic.Net has successfully mitigated the VENOM vulnerability in our USA-West-1 (San Francisco), USA-Central-1 (Dallas), USA-East-2 (New York) and Canada-East-1 (Toronto) Cloud locations.  USA-East-1 (Orlando) is almost complete, however, there is a small percentage of Cloud Servers that will need to be manually rebooted.  If you are one of the few affected, an email will be sent to you shortly with further instructions.

UPDATE 05/14/15: Atlantic.Net sent notification to the small percentage of Cloud Servers that needed to be manually rebooted in USA-East-1 (Orlando).  Those that were notified have until 11:59 pm ET on May 15, 2015 to power cycle their Cloud Servers per the instructions provided in the email. If they have not done so by the previously mentioned time, we will shutdown their Cloud Servers and power them back on.

UPDATE 05/16/15: Atlantic.Net has now successfully mitigated the VENOM vulnerability in USA-East-1 (Orlando), and as previously noted, all other Cloud locations.

You can read more about VENOM here.

If you have any further questions, please contact our Support team.


The HIPAA Compliant Cloud: An Introductory Report

More and more healthcare companies are evaluating the cloud as a possible environment for data processing and storage. As more investment has been pumped into the cloud industry, systems have become substantially more robust and complex. However, federal law dictates that providers, health plans, and health data clearinghouses must keep all “protected health information” (PHI) secure and confidential – and the role of technology providers is critical.

“The HIPAA Omnibus Rule had several changes in how CEs and business associates could handle patient data,” explains Elizabeth Snell of HealthIT Security, “and what the ramifications will be if that data is compromised in a data breach.”

Read More


The Challenge and Promise of Big Data

As the Internet has grown, so has the amount of data and the extent to which data is valued – most notably by the government and publicly traded companies, although even small businesses appreciate the insights they collect from Google Analytics and similar services. Stockpiling and scrutinizing data is considered an extraordinarily powerful way to deliver better products; understand how people use websites and applications; track employee performance; determine the most effective marketing language; and more.

According to projections released by International Data Corporation, the big data market will maintain a CAGR of 26% through 2018, when sales of big data services will hit $42 billion.

Read More


10 Nuggets from the 2015 Cloud Computing Stats

  • Power: Supercomputers & Leapfrogging
  • Statistical Nugget #1 – Cisco
  • Statistical Nugget #2 – Centaur Partners
  • Statistical Nugget #3 – Computerworld
  • Statistical Nugget #4 – Forrester
  • Statistical Nugget #5 – Forrester
  • Statistical Nugget #6 – Goldman Sachs
  • Statistical Nugget #7 – Network World
  • Statistical Nugget #8 – IDC
  • Statistical Nugget #9 – IDC
  • Statistical Nugget #10 – IDC
  • Cloud from a Proven Provider, Not a Startup

Read More


Sharp Focus on HIPAA: Breach Notification Rule

Hacking news at the top of 2015 is driving the Health Insurance Portability and Accountability Act of 1996 (HIPAA) into the limelight. The news – that the second largest insurer in the United States, Anthem, was breached, resulting in the compromise of 78.8 million patient records – makes the HIPAA breach notification rule more relevant.

Many are aware that the Final Omnibus Rule of 2013 modified the law so that business associates are now effectively considered covered entities, but how does that designation apply to notifications? In other words, what does anyone who handles sensitive protected health information (PHI) have to do post-hack in terms of alerting clients, the press, and the HHS?

Read More


Building the Tax Cloud

It’s unseen, but it’s changing our lives. We can watch movies from any location and fill our smart phones with applications that offer data accessible “in real time” because of the high speed and low cost of cloud technology.

However, the accounting world has often not made full use of cloud, unaware of innovations in public cloud security and the emergence of the hybrid model, which allows companies to integrate public and private components. Four out of 10 (41%) accountants reported in a 2014 Network Management Group poll that they were not using any cloud services, while 3 in 10 (32%) said that they were converting at least one of their applications to cloud by 2016.

Read More


State of the Legal Cloud – Overview & Highlights

The American Bar Association focuses heavily on technology, with its Legal Technology Resource Center (LTRC) releasing the ABA TechReport every year.

Technology author Dennis Kennedy wrote a report on cloud computing for the 2014 edition, revealing incredible growth in the legal cloud over the next 6-12 months:  35% of non-cloud firms expect to use web-based apps or deploy the ultra-reliable, supercomputer-trumping virtual machines themselves for the first time.

Read More


Stay Connected With Us