Hybrid IT: Why Cloud Delivery Matters

December 16, 2015
By David Shacochis

In meeting with customers and partners over the past several months, I hear one question on a regular basis: "We like the flexibility of your Hybrid IT portfolio, but why are you building a public cloud?" As recently stated by our CTO, we are committed to a next generation cloud user experience for the delivery of our primary business: managed services across data center and network .

To understand why we are using this approach, it’s helpful to think about the writings of Nick Carr. His 2003 Harvard Business Review article "IT Doesn’t Matter," touched off a firestorm of debate throughout our industry, especially within the vendor community.

It’s easy to see what Mr. Carr got right. He correctly observed that the client-server era led to companies over-estimating the discrete value of IT device technology. He stressed the importance of strategic alignment between information technology and business stakeholders. He predicted the rise of cloud computing and utility-like pricing based on consumption.

And while there are valid criticisms afforded by a decade of hindsight, Carr’s fundamental truth holds up today. IT isn’t valuable unto itself; its value is derived from what it allows the larger organization to...

Read on...

Colocation: Why Go There?

December 14, 2015
By Matt Farrell


In today's IT market place, decision makers are often burdened with finding the right hosting mix. The challenge is often determining where the business services would best fit: into Colocation, Managed Hosting, or Cloud? Or is it possible that a Hybrid IT model is most effective? The answers to those questions are not always clear. This blog focuses on Colocation Services; and how to determine when Colocation Services may be the right choice for you. While Cloud Services seem to demand a majority of the market attention, Colocation offers the value of owners economics. Colocation allows for more control and predictable traffic patterns, as it provides monthly OpEx. We aim to provide a comprehensive definition of the Colocation space while focusing on some of the more prominent benefits of Colocation. In addition, this post will distinguish when Colocation may make more sense versus other IT spaces.

What is Colocation?

At its core, Colocation is pretty simple. Retail Colocation providers offer space, physical security, power, and cooling for the server, storage, and networking equipment of other firms. Colocation providers further offer the ability to connect to an ecosystem of cloud, platform, ISV, telecommunications and network service providers - with minimum cost...

Read on...

Taking a Different Look at WordPress

December 7, 2015
By Andy Watson


What is WordPress?

Today, nearly 25% of the sites on the Internet are WordPress sites. WordPress is an open source project that started out as just a blogging site has grown into a robust user-driven Content Management System (CMS). With WordPress, the use-cases are unlimited. There are thousands of plugins, themes, and widgets that help extend and add to the functionality available in WordPress.

In addition to all that WordPress has to offer, there is an extensive and helpful community of WordPress users around the world. Questions and answers can be found in support forums, mailing lists, WordCamps and, if that is not enough, thousands of video presentations exist and are being added to on wordpress.tv to help everyone, from the beginner to the expert.

Ways to Integrate WordPress on CenturyLink Cloud

WordPress - Blueprint

The CenturyLink Blueprint provides a click-through solution to install and configure WordPress on a new or existing server in the Linux platform.

CenturyLink Cloud works with Bitnami to provide open source software integrations to its customers. Bitnami is a library of popular server applications and development environments that can be installed with one click, either in your laptop, on a virtual machine (VM) or hosted in the cloud. Bitnami takes care...

Read on...

Colocation Buyer’s Guide

November 19, 2015
By Joseph Nguyen


In regards to Colocation, the saying: "You get what you pay for...” is especially true. Generally, the least expensive quote does not always offer the best value. In this article, we will cover an array of important topics that affect the cost-to-benefits ratio in an effort to arm you with the necessary knowledge to make educated decisions throughout the process. Whether you are just beginning the quest of determining if Colocation is a viable option for your business, or are just starting to shop the market for providers, this guide highlights some of the things to consider throughout the process.

Meet with the Prospective Teams

Talk with the sales and technical staff to gauge if their knowledge and routines are a match for your business needs, which is important because they will become an extension of your existing team. The staff will help you support equipment, answer questions, and you can leverage them to provide additional insight on the best practices for deploying and scaling your operations.

Schedule a site visit.

A site visit is a must. Evaluate the site and confirm everything is "as promised" while gaining a deeper understanding of what will be available in the future. This is a great time...

Read on...

Fedr8 on AppFog is Driving PaaS Usage in Unique Ways

November 16, 2015
By @KeithResar


The PaaS Promise - as Implemented

As an industry we see a need for faster iteration on business solutions and an expectation of higher quality. AppFog, like all cloud-based Platform-as-a-Service (PaaS) offerings, is supporting this by changing the way these applications are developed, hosted, and deployed. This change permeates throughout organizations far more deeply than the adoption of Information-as-a-Service (IaaS). In his Forbes article Mike Kavis pointed out the following:

The intent of PaaS was to abstract away all of the messy and challenging IT plumbing work so developers could just write code. PaaS’s original promise was “forget about infrastructure and operations, we will handle that for you.”

This usually presents itself as developers operating with less day-to-day involvement with IT processes as well as the staff focused on infrastructure operations. No more logging tickets for resources and waiting for manual procurement and provisioning. Once developers are using a PaaS in production, the day-to-day management and scaling of the app is highly automated.

Fedr8 Takes PaaS Adoption One Step Further

This is why the Fedr8 model on AppFog struck such a unique chord. True their service depends on PaaS for all the typical operational efficiencies in the web front-end, release management, and...

Read on...

Data Center: Media Protection

October 30, 2015
By Daniel Morton, et. al.

Data Center Media Protection

Ensuring the privacy and confidentiality of data and that customer media is protected are strategic priorities at CenturyLink. That filters down into our chain of custody procedures when handling or transferring customer media and in our procedures for the sanitization and disposal of media. Here's a shocking observation from the National Institute of Standards and Technology (NIST) Special Publication 800-88, Rev.1 on a leading source of media vulnerability and what is needed to close the gap.

An often rich source of illicit information collection is either through dumpster diving for improperly disposed hard copy media, acquisition of improperly sanitized electronic media, or through keyboard and laboratory reconstruction of media sanitized in a manner not commensurate with the confidentiality of its information. Media flows in and out of organizational control through recycle bins in paper form, out to vendors for equipment repairs, and hot swapped into other systems in response to hardware or software failures. This potential vulnerability can be mitigated through proper understanding of where information is located, what that information is, and how to protect it.

Part 3 of the Data Center series highlights the safety measures in place for digital and non-digital media in a CenturyLink data center. We've limited...

Read on...

Deploying Environments and Applications with Source Code: The Cloud-based Approach to Application Creation

October 28, 2015
By Chris Kent


Creating and deploying applications is like a carefully choreographed dance. One that requires balancing business goals with expectation setting. This feat includes steps like writing groundbreaking code, solving timing restrictions, and overcoming the technical obstacles between all of the teams involved. Ensuring that the dependencies and timelines between the development and testing teams are in sync and align with the hosting company and their assigned help desk engineers can be a daunting task in itself, and it often creates a bottleneck in the process. Even though this dance can be repeated countless times, it’s usually this last step that is clumsy and always results in a different outcome. What if there was a more streamlined, succinct approach to creating and duplicating environments?

What Is Killing Your Deployment Timeline?

Often, the environments in which applications are developed, tested, and deployed compose one of the biggest variables that can impact an overall timeline. The elements of the environments are the same almost every time: a carefully constructed staging environment, which is a cleaner, more stable version of the development environment, both of which closely mimic QA and production environments. When the time comes for deploying to a live environment, unless the environments closely align,...

Read on...

Data Center: Environmental Protections

October 23, 2015
By Daniel Morton

Data Center Environmental Protections

Cyber attacks on major corporations generate big news headlines, especially when they are successful. Threats to a data center from heat, humidity, water, or smoke aren't as flashy in terms of media coverage. They are, nonetheless just as real and, potentially, just as devastating. That's why you need a full array of environmental protections in and around your data center.

Any data center provider will affirm that they're required; and that all built-in protections fly under the radar until you really need them. To illustrate the point, on January 9, 2015 several news agencies covered a 3-alarm fire at a data center in Ashburn, Virginia. The massive building was under construction. The conflagration apparently had started on the roof. Fortunately, there were no injuries and firefighters were able to extinguish the blaze after about an hour.

This is Part 2 in a 3 Part series highlighting different protections inside and around a CenturyLink data center. This time we focus on the environmental safeguards that protect the facility, personnel, the infrastructure, and your data. If you missed Part 1 in the series, Data Center: Physical Security, you can find that topic right here.

Data Center Locations

We carefully choose the location of a data center...

Read on...

Starting from Scratch with Cybersecurity: Introduction to Security Products Part 1

October 21, 2015
By Stephanie Wong, Product Owner.

Security is newsworthy. Recently, the IRS reported as many as 330,000 taxpayer accounts they believe were accessed by thieves. These security breaches often result in identity theft and the loss of critical corporate data, and can cost your company millions of dollars in unrecoverable expenses.

As a company, you need to be aware of IT security and your need to be protected, and you might be wondering where to start. This post is the first in a multi-part series about the various types of security products available and what they can do for you. These tools can be used to secure anything -- whether it's a home PC or laptop, an enterprise tech stack or even a hosted hybrid cloud solution. The same principles apply everywhere. Initially, we’ll begin with host-based security products.

Host-based security products are those that reside on or help to protect one host, server, or virtual machine. These host-based security products can be used at home or at work. The three fundamental types we’ll discuss here are Anti-Virus/Anti-Malware, firewalls and IDS/IDP.

Anti-Virus or Anti-Malware

Let’s start with Anti-Virus or Anti-Malware products. These products detect and protect against software viruses on your host. These harmful files get to your host through...

Read on...

Data Center: Physical Security

October 16, 2015
By Daniel Morton, et. al.

Data Center Physical Security

"Data security starts with physical security." Natalie Lehrer underscored that point in her Information Week article called A Guide to Physical Security. She's right. Protection of company personnel, facilities, and data begins with physical security. It's a strategic priority at CenturyLink. The "rubber meets the road" in the management and operation of the facilities. Our data centers earn a M&O Stamp of Approval Certification from the Uptime Institute. Joel Stone is responsible for Global Data Center Operations at CenturyLink. Here's his take on the importance of a data center receiving M&O Certification:

"Earning the M&O certification demonstrates the effectiveness of a data center’s management and operations, giving customers “peace of mind” by ensuring the facility that houses their critical IT functions has passed a rigorous, third-party audit to conform its practices to the highest of standards."

This is Part 1 in a three part series covering various aspect of data center security. Part 2 will discuss environmental protections. Part 3 will cover media protections.

Security Policies

It starts at the top. Physical security at a data center is governed by CenturyLink Corporate Security. This group oversees the policies, processes, and work rules ensuring that all data centers operate under a consistent set of procedures...

Read on...

Time to Plan Your IPv6 Transition!

October 14, 2015
By Marla Ankenman


For several years now, the question around the shift to IPv6 has been "When?" NOT "If". As of September 24th 2015, the American Registry for Internet Numbers (ARIN) announced it had issued final IPv4 addresses and the free pool for IPv4 addresses had reached “zero.” The time to prepare for your businesses' IPv6 transition is now!

Why Now is the Time to Start Planning

While a majority of the world's devices today are not yet compatible with IPv6, dual-stack technology ensures that legacy IPv4 devices will still work for the foreseeable future. However, soon IPv6 will be the only option for adding new devices or hosts on the Internet. Understanding the background behind IPv4 and the benefits of IPv6 are the first steps in proactive planning.


Computers use Internet Protocol (IP) to find one another and permit communication. IP Version 4 (IPv4) was developed in the early 1980s during a much simpler time in Internet evolution. At that time, 4 billion addresses seemed like a huge number! Since then, the number of computers attached to the Internet has multiplied many times over. Plus, our vehicles and many devices in our homes and pockets use network connections. With the growing trend toward the Internet of...

Read on...

Hybrid IT: Migration as Evolution

October 8, 2015
By Steve Tarver

Improving your business requires changing your business. When dealing with Migration, changes need to be researched per business case and methodically implemented. Stakeholders and leadership are always looking for opportunities rooted in IT and product improvements. Whether these improvements are driven by cost savings or the need for increased capacity, disaster recovery, proximity to customers, or IT/product agility, a diversified data center solution could provide the advantages you are looking for. Over half the market of Enterprise IT decision makers are in the same boat and are researching change that will include a hybrid IT solution by 2017.

To help outline the benefits you might achieve through migration, this article introduces:

  • Four basic hosting options
  • Hosting option characteristics
  • Hosting option selection goals:
    • Converting capital to operating expenses
    • Offloading staff responsibilities
    • Specific operational goals

Data Center Options

The market has responded to customer needs by providing several layers of data center options, offering increased offloading of facility and infrastructure management. Although individual providers have different mixes of features to offer and different ideas about what services to offer at each level, we can divide the space into four general categories.


Company-owned data centers run the gamut of sophistication from a gear closet to a stand-alone data center with dedicated facilities management....

Read on...


    Follow us on

Start Your Free Trial

High performance, fast deployment times and intuitive management capabilities that will push your business forward

*We will send a SMS message to verify your account, standard rates apply.