There has been a critical vulnerability found in Bash. The vulnerability affects Linux/Unix distributions that use or have Bash installed.
“This guidance is intended to help organisations consider the security features of cloud services they wish to use. It is the first of a number of guidance documents for the public sector relating to the use of cloud services to process OFFICIAL information. “ ~ UK Government
While the colocation hosting model is being pressured by other flavors of server delivery including virtual private servers, private clouds, and hybrid cloud implements, it continues to be a major drawcard for IT managers and companies who wish to maintain control and ownership of compute, storage and network devices.
While many business leaders are now internalizing the general benefits of cloud technology, including the ability to scale resources up or down during seasonal spikes in activity, there is perhaps one area that should be discussed more: Automation.
For the last several years U.K. and U.S. enterprises and SMEs have been using server and/or database clustering to apply the principles of grid computing and ultimately save organizations thousands, sometimes millions of dollars.