Author Archives: Onsite Computing, Inc.

Public clouds vs. private data centers: Which ones are more sustainable?

With more businesses striving to reduce their environmental impact, the debate between public clouds and private data centers is gaining traction. Both have their pros and cons, but which one offers a more sustainable approach? This article explores the key factors that contribute to the environmental footprint of each, from energy consumption to carbon emissions, […]

Which is more eco-friendly: A public cloud or a private data center?

As companies evaluate their IT strategies through a sustainability lens, the choice between public clouds and private data centers becomes more nuanced. This article compares the environmental impacts of both models, assessing energy use, carbon footprints, and the scalability of sustainable practices to determine which approach offers a more eco-friendly future for modern businesses. Understanding […]

Is the public cloud a greener choice than private data centers?

Sustainability is now a top priority for many organizations, leading to the critical question: is migrating to the public cloud a more eco-friendly choice than maintaining a private data center? This article breaks down the environmental implications of both options, examining how energy efficiency, infrastructure, and resource sharing play a role in determining the greener […]

Microsoft geht jetzt unter die Phish-Fänger

Microsoft geht zwar nicht unter die Imker, jagt aber Kriminelle mit süßen Daten. Shuttertstock – inspiring.team Die Anzahl, Arten und Qualität von Cyberangriffen nehmen beständig zu – soweit ein alter Hut. Neu ist aber, dass immer mehr gesetzestreue Cyberakteure in die IT-Offensive gehen. So stieg zuletzt etwa das FBI in den Krypto-Markt ein. Die Täuscher […]

Chinese Nation-State Hackers APT41 Hit Gambling Sector for Financial Gain

The prolific Chinese nation-state actor known as APT41 (aka Brass Typhoon, Earth Baku, Wicked Panda, or Winnti) has been attributed to a sophisticated cyber attack targeting the gambling and gaming industry. “Over a period of at least six months, the attackers stealthily gathered valuable information from the targeted company including, but not limited to, network […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.