Are Zombie Servers Eating Away at Your Profits? Recently, it was reported via a joint study involving researchers at Stanford University and TSO Logic that 30% of all data center servers don’t actually do anything. These “zombie servers” remain plugged in and continue to draw power while delivering no useful information. These 10 million-plus comatose servers were also the topic of a report recently released by the Natural Resources Defense Council (NRDC). The NRDC’s researchers determined that if data center facilities across the U.S. were able to implement the tools […]
What are Man-In-The-Cloud Attacks? It seems like every week new data security risks come to the forefront of tech news. Most recently, the data security firm, Imperva, discovered that even our cloud-based storage partners aren’t as secure as we once believed. As it turns out, many of the top cloud storage providers are susceptible to side door man-in-the-cloud attacks. The most concerning news regarding this cloud computing security revelation is that data thieves can access your files without even needing your login and password information. As with most data security […]
Liquid Technology is pleased to announce that the Brooklyn-based company has made the prestigious Inc. 5,000 list for the seventh time in the past eight years. Liquid Technology is ranked at #3597 on the 2015 Inc. 5,000 list and ranked in the top 50 of the fastest growing tech companies in the NY Tri-State Area. “We are thrilled to be honored for the seventh time in the past eight years; we see this as a significant accomplishment,” said Richard Greene, Liquid Technology’s Managing Partner. “We have experienced continued growth and […]
Countdown to the Windows 10 Release Date Tomorrow Microsoft is releasing its latest operating system – Windows 10. In an act of what can be considered either generous or daring, the software giant is literally giving its new operating system away. And, just like your average TV infomercial, that’s not all. Users also get free lifetime upgrades and future upgrades occur automatically. This is a limited time offer, however. Users have one year to grab their free copy of Windows 10. After that, the price will go up to $119 […]
Remember the Heartbleed Bug, the vulnerability in OpenSSL that enabled outside entities to eavesdrop on Internet communications, steal data, and impersonate services and users? Well, there’s a newer, and yes, more serious data center security threat in town – VENOM (CVE-2015-3456). And, true to its name, VENOM is deadly dangerous. VENOM, which stands for Virtualized Environment Neglected Operations Manipulation, allows hackers to gain access elsewhere on a server and potentially elsewhere within a data center. In other words, hackers can take over large portions of a data center, potentially every […]
With its fresh, clean air and rising temperatures, spring is the ideal time to open up the windows and give the home a thorough cleaning from top to bottom, hence the term “spring cleaning.” But, the home isn’t the only place that needs an annual clean-up. Spring also makes for the perfect time to spruce up and streamline the office. And, for many companies, this means getting rid of inventories of old, outdated IT. If your office is undergoing an IT spring cleaning, then you need to ensure that you’re […]
On July 14, 2015, Microsoft will officially stop supporting its popular Windows Server 2003. How popular is it? The software giant estimates that there are currently nearly 24 million components running Windows Server 2003 across nearly 12 million physical servers worldwide. In total, the program accounts for roughly 39 percent of the entire Windows install base. Like Windows XP before it, the Windows Server 2003 EOL will impact a tremendous population of users. While this announcement might have some data center managers shaking in their boots, especially after the vulnerabilities […]
If you purchased a new Lenovo laptop any time after August 2014, then there’s a good chance your device is infected by an inconspicuous piece of adware designed by a company called Superfish. This past week, the industry has been buzzing with details regarding the Lenovo Superfish malware security flaw, to the point that the Department of Homeland Security is urging those with Lenovo laptops to remove the adware from their computers as quickly as possible. What is Superfish Malware? The official name of the spyware is Superfish Visual Discovery. […]
Due diligence is a term that’s commonly used in the business world. And, when it comes to finding an e-waste recycler for your company’s IT overflow, due diligence is exactly what you need to do to ensure that the company you’re handing your hardware over to does exactly what they claim to do. The reason is because e-waste recycling is a hot topic and as one might expect, there are companies out there trying to cash in on it without actually recycling anything. Fake e-waste recycling not only hurts your […]
New York, NY, November 17, 2014 – Liquid Technology, an Inc. 5000 IT asset disposition (ITAD) company and one of the Top 100 Businesses in New York-Northern New Jersey-Long Island, NY-NJ-PA, announces that it has recently acquired certifications in the latest e-Stewards 2.0 and R2:2013 standards. E-Stewards certification is one of the most important certifications in the e-waste recycling industry because in order to achieve it, a recycler must be able to meet or exceed certain qualifications. These include having a comprehensive chain of custody process, a certified data destruction […]