RSS

Latest Cloud and Web Hosting News

theWHIR's Web Hosting News provides daily news, information and opinion about the Web hosting industry. Get email updates: Subscribe to theWHIR's Daily Web Hosting Newsletter

Cloud Hosting Considerations for Global Organizations

byoc

It’s well known that cloud computing is a distributed system where data is never really stored just in one spot. This holds true for application, desktop and even cloud-based website delivery options. The idea is to create a robust, widely available system for many users to access. Some organizations require the use of a cloud provider which is local – or regional. Many others look to work with hosting providers which cater to the international organization. Is there a difference? Read More

Web Hosting Sales and Promos Roundup – Memorial Day Edition

usflag

In the week ending May 22, 2015 ahead of the Memorial Day weekend in the US, several hosting providers are offering discounts in honor of the holiday. Zee-Way Hosting is offering 20 percent of VPS hosting for Memorial Day, Hosting24 is offering up to 70 percent off all web hosting plans, and Websnoogie is offering 20 percent off web hosting and web design for a limited time. Read More

Peak Hosting Taps Digital Realty For Two Data Centers

servers

Managed hosting provider Peak Hosting tapped Digital Realty to get two new data centers up and running quickly. In order to meet customer need for geographically distributed locations, the company added data center PODS (Performance Optimized Data Suites) in Richardson, Texas and Santa Clara, California. Each POD consists of 1.25 megawatts in full 2N environments. Read More

Logjam Vulnerability Could Impact More Than 500 Cloud Providers: Report

cloudrisk

Tens of thousands of HTTPS websites and numerous enterprise networks could potentially be affected by a vulnerability called “Logjam” according to the security experts who identified it this week. Cryptographic weaknesses in the Diffie-Hellman key exchange algorithm may allow decryption and manipulation of data, and man-in-the-middle attacks on TLS. Read More