Search
Financial IT Reaches Crossroads: Study Reveals Demand for Digitalization in a Slow-Moving Industry
CHARLOTTE, N.C. – October 26, 2016 – Peak 10 - National IT infrastructure, connectivity and cloud services provider, Peak 10, Inc., announces the results of...
Data center interconnect over SD-WAN
In the sixth post in an interconnection-focused blog series, Flexential VP of Network, Tim Parker, discusses private, secure connectivity. Read the previous blog, “IP Bandwidth...
Data Center Tiers: Behind the Numbers
Colocation or other IT infrastructure service providers love to talk about their “tier” numbers. If you've been seeking out these services, you've probably asked yourself...
Security Is Key for Financial Services Providers
Over 65% of financial services providers are leveraging a hybrid approach to data processing and storage, using some combination of in-house solutions, colocation and cloud...
Retail Reliant on Hybrid Edge IT Strategy
Nearly 63% of retailers surveyed are taking a hybrid approach to data processing and storage, leveraging a combination of in-house data center assets, colocation services...
The IT Transformation Continuum: Adjusting Technology Initiatives to Fit Into the Digital World
Before you can understand the IT Transformation Continuum, it’s important to define IT transformation itself. Precipitated by digitalization, IT transformation enables businesses to digitalize and...
The Connected Data Center: How Enterprises Can Benefit from Network-Enabled Colocation
As it turns out, there is more than one edge. There is certainly the far edge that reaches all the way to end-users, mobile devices...
Dodging Dire Consequences in the Age of DDoS Attacks
DDoS Attacks: Malicious Crimes with Dire Consequences In today’s world, every business needs an online presence. Whether we're talking about retail, gaming, or healthcare, being...
Edge Data Centers Help You Beat the Competition
Our On-Demand Culture Has No Time for a Slow Network and the Edge is the Answer The internet has seen incredible growth in content and...
Fire Planning Associates Relies on ViaWest to Provide Critical Infrastructure Planning for Montgomery County
Denver, CO – May 17, 2016– ViaWest, a leading provider of Hybrid IT Solutions and Colocation in North America, today announced that Fire Planning Associates...
Flexential Sponsors Ride The Rockies 2018
For the third year in a row, Flexential is the title sponsor for the Denver Post’s Ride The Rockies Bicycle Tour. The event, held June...
IP Bandwidth that Keeps Pace with the Growing Need for Internet Presence
The Global, Growing Need for an Internet Presence Requires Robust IP Bandwidth In today’s world, all companies are expected to have an online presence, and...
Reflections on PTC ’18
Attending Pacific Telecom Conference 2018 The Pacific Telecommunication Council’s premier winter interconnection event is attended by nearly 7,500 industry experts and service provider executives every...
Recovering From Disaster While Maintaining HIPAA Compliance
It’s important to note that the same requirement for contingency planning applies to business associates, as noted in the 2013 HIPAA Omnibus Rule. In general...
Florida Businesses Maintain Business Continuity with Peak 10 During Hurricane Matthew
CHARLOTTE, N.C. – October 18, 2016 – Peak 10 - Thanks to detailed preparation and continuous communication, Peak 10 maintained 100% uptime for customers out...
Overcoming HIPAA Challenges
The Health Insurance Portability and Accountability Act (HIPAA) of 1996 has raised many questions around IT solutions that support healthcare initiatives. Although HITECH expanded the...
IT Transformation Through Virtualization
The IT Transformation Continuum is the journey in which businesses evolve and transform their IT infrastructures to create efficiencies through virtualization, integration and automation. It’s...
IT Transformation Through Data Security
In truth, most security downfalls are a result of inconsistent patching and failing to prepare engineers and users with proper knowledge through awareness and training...
Information Security Best Practices: Invest in People
Incidents of cyberattacks and data leakage due to inside sources continue to make the headlines, as do the tremendous damages inflicted on companies’ bottom lines...