Deft Blog

Keep up with the latest in colocation, cloud, and disaster recovery services.

The birth of DevOps

The birth of DevOps changed everything. It hugely impacts legacy code deployment strategies by combining Dev, QA and Ops, removing the walls and barriers, and softening the distinction between these teams. Here’s why it matters.

I want to talk about the AWS Transit Gateway

I want to talk about the AWS Transit Gateway announced at re:Invent. This is really exciting for anybody that's dealing with large, complex AWS environments, or has a sizable networking environment that they manage on-premise today. There's been a problem with moving...

How best to prepare for adoption of a cloud-based EMR

This post originally appeared on EHRIntelligence.com. It has been updated and condensed for clarity.Many hospitals and healthcare centers remain skeptical about cloud-based electronic medical record (EMR) solutions. But the truth is this: The cloud offers a robust,...

Tips for building a cloud migration plan

Deft has done innumerable cloud migration plans for clients. The biggest element that we see causing issues for organizations is not computing issues, but not preparing a meticulous plan for execution. Planning is the biggest step for the migration to cloud computing....

Northeastern Illinois University modernizes IT infrastructure

Chicago, IL — NEIU CIO Sam Kann recently moved the university's on-premise infrastructure to a hybrid cloud solution architected and managed by ServerCentral Turing Group (SCTG). The modernized infrastructure provides NEIU with the tech credibility it needs to attract...

Recent Linux vulnerabilities and the importance of patching

The importance of keeping system patches current to ensure security cannot be overstressed, as recent vulnerabilities identified in the Linux world have shown. Word recently broke of two serious vulnerabilities affecting Linux kernels that can cause complete loss of...

Cloud’s growing importance to higher education

While working with several public and private colleges and universities to help them make the shift from IT-centric to user-centric computing, I have found very similar outcomes. Removing the day-to-day firefighting off their hands had these effects: Allowed the IT...

ServerCentral Announces PCI DSS 3.2.1 Compliance

Customers can now better protect payment data ServerCentral, a leading provider of managed IT infrastructure solutions, today announced its VMware-powered Enterprise Cloud has received compliance certification with the Payment Card Industry Data Security Standard (PCI...

VMware trends and what they mean for the enterprise

At the VMworld event there were 17 discreet product and service announcements made from VMware alone. That’s a lot of information and a lot of product development to digest in a very short timeframe. We’ve done some of the work for you.

The Benefits of a Connectivity-Centric Cloud

In June 2018, Comcast suffered a major outage that impacted their Xfinity service nationwide. As one commentator said: “For a minute there, it looked like the whole internet was down." That’s a big deal, especially if you rely on cloud services to power IT at your...

Data Center Modernization with VMware

Data center modernization is a never-ending goal, even when the decision is to transition to cloud-first or cloud-native environments. Unfortunately, the cloud isn’t a finish line. It isn’t a finite destination. In reality, the cloud is a (seemingly never-ending) set...

4 considerations for picking a data center transit provider

When you're selecting a transit provider for your data center environment, keep in mind that you're picking who brings customers to your doorstep, who controls a portion of your user experience, and of course, who controls a huge part of your uptime. There are many...

Increase Uptime in Your Data Center Network

As networkers, we’re constantly thinking about redundancy and uptime. We’re taught that multiple links and devices means resiliency, which can be true, but complexity in the network can be equally complex to troubleshoot when things go wrong. The classic Layer 1-2...

Hard Drive Destruction

No matter what business you’re in, information and network security are important to every company.  So, what do you do about that pile of old hard drives in the office closet? Hand them over to Deft for a secure and documented destruction at our flagship data center...

5 Ways to Get The Most Out of Remote Hands

Part One: Plan for A Fire Drill Responding to trouble tickets manually submitted by our customers is one of the most prevalent and essential tasks that we perform on a daily basis at ServerCentral. Sometimes I take how long I've been sending and replying to trouble...

How to determine your power requirements

One of the hardest concepts when considering data center colocation is determining how much power equipment needs. There are many ways to find out what your power requirements are, but no matter what method you use, all computations involve three electrical concepts:...

5 Questions for Selecting a DDoS Mitigation Service

The sophistication, size, and frequency of Distributed Denial of Service (DDoS) attacks continue to increase—with no apparent end in sight. Where 2 Gbps attacks were once the norm, organizations are now routinely taking steps to mitigate 200+ Gbps attacks against not...

Executive buy-in key to cloud success

Behind every successful cloud implementation is an enthusiastic executive team. In fact, actively engaged executive sponsors continue to be the top driver of whether IT projects meet their original goals and business intent (Source: PMI). So ask yourself: How well...

SOC 2 Report Now Available with Privacy Section

I'm proud to announce that ServerCentral's 2016–2017 AT-101 SOC 2 Type II report is now available to download in our customer portal. All customers with access to compliance reports can view the report for any of our US-based data centers. If you are a customer and...

OS X High Sierra Zero-Day Announced

Normally, passwords stored in a Mac Keychain vault require a master password for access. Now, attackers can steal Keychain passwords without it. Just hours after the launch of Mac OS X High Sierra, a security researcher has identified and released a zero-day exploit...

SOC 2 Report Progress

We expect and rely on information security experts and engineers to keep up-to-date with the latest exploits or attacks, just as we expect compliance experts to maintain a high level of certainty in their controls and tests. It’s part of how we’re able to address the...

Three Benefits of Shadow IT — And How to Harness Them

What is shadow IT? It helps to first define shadow IT, sometimes known as dark IT. Most would start with a rundown of the network security risks it presents, but a more helpful shadow IT definition would explain it as something that’s already happening in your...

What’s Top of Mind in IT?

In December 2016, we began a research effort by categorizing the conversations we have with customers and prospects. We wanted to answer a few questions: Coming into 2017, what are people most interested in and focused on? Are there common themes or project scopes...

Mitigating BlackNurse Denial-of-Service Attacks

In 2016, every company, no matter the size, has an online presence. Whether that is a website, online store front, perhaps a mobile app, or a mail server, chances are your organization has some kind of system in production on the Internet. It has long been established...

Categories

Deft, a Summit company

Deft, a Summit company
2200 Busse Rd.
Elk Grove Village, IL 60007
+1 (312) 829-1111