A friend of mine is a system administrator for an East Coast company with a secondary (DR) data center at a colocation in a western state. We chatted recently about some of the features of his secondary data center, which is dedicated to maintaining security and uptime for its clients. With his insights fresh in mind (and with his permission), I thought it might be interesting to outline the processes used by the hosting organization -- which I'll leave nameless for confidentiality purposes -- by discussing what you might expect to encounter were you to visit it.
Gigabit-class broadband is capturing the imagination of Internet users throughout the country. With Google and other companies bringing fiber-based services that deliver a gigabit of data each second to the home, communities are accelerating their push to get the highest speeds.
A consumer who really needs 1,000 megabits of bandwidth is probably a rare creature, but excitement over fiber deployments show there is at least some demand for what is a ludicrous speed compared to most home Internet connections.
In October, a report surfaced that the US National Security Agency secretly accessed data from tech giants like Google and Yahoo, by way of intercepting the unencrypted traffic flowing between each company's data centers.
FOR people living under repressive regimes censorship is an everyday reality, and browsing the internet freely is impossible without some serious technical know-how. This week Google threw its weight behind an idea that lets people circumvent censorship by using the internet connection of a friend in a non-censored country.
A collaboration between the University of Washington in Seattle and non-profit firm Brave New Software, uProxy lets users share their internet connection with friends on social networks through a browser extension.