Home » Raritan Blog
Jessica Ciesla
August 30, 2018
Data breaches are nothing new. Unfortunately, they are unwanted events that wreak havoc on North American organizations across industries. As discussed in Part 1 of our series, these breaches constitute a theft of an individual's personal or confidential information, including name, Social Security number, financial data, medical record, or credit card information. While the cost of data breaches can vary, one thing is certain: some industries are at a higher peril than others.
Rick Gonedes
August 21, 2018
They say that life happens in a blink of an eye. In the case of Choice Hotels International, which operates more than 6,300 hotels worldwide, life happens at a much faster pace. At the heart of one of the world's largest lodging companies is its global reservation system. When someone checks in or out, a room is looked at, or a reservation is made, the transaction is promptly processed via Choice's data center. The challenge of course is that any downtime not only means lost revenue, but dissatisfied customers. This challenge is all too familiar for many corporations; fortunately, a solution exists whereby a virtual presence within an offsite data center is created.
Rick Gonedes
August 14, 2018
Content originally sourced from 451 Research.
Disruptive technologies will have the unique opportunity to positively impact data centers. In Part 2 of this series, we explored two technologies that are staged to change the very system and infrastructure of IT systems. In this final portion of our disruptive technologies series, we want to take a look at two technologies that will bring heightened levels of agility to data centers for a fraction of the cost.
Rick Gonedes
August 6, 2018
Content originally sourced from 451 Research.
The technological world is constantly innovating and evolving. Rather than break the rules, data centers can be found at the heart of these positive, yet disruptive changes. In Part 1 of this series, we explored two disruptive technologies that will help to meet the growing demands for data generation, security and storage. Now, we want to examine two technologies that will have the power to change the infrastructure and design of IT systems.
Jessica Ciesla
July 25, 2018
For the past few years, data breaches have run rampant amongst the news headlines. These breaches are defined as events whereby an individual's personal information, such as their name, Social Security number, financial or medical record, banking credentials, or credit card is put at risk or stolen. Recent studies have revealed that data breaches are either the result of an internal or external malicious attack, system error, or human error. While the causes of data center breaches vary, the result is typically costly for any organization.