Fortifying Your Cybersecurity Strategy

Fortifying our cybersecurity strategy is a critical priority at Equinix, as it is for our many customers around the world. In this blog from our continued series on the topics that keep CIOs on their toes, we’ll tell you about some of the best practices we employ to keep ahead of the quickly evolving cyberattack threat.

Want to Know How Digital Transformation in Manufacturing is Driving Interconnection Growth?

These emerging technologies are revolutionizing the manufacturing industry with several applications that benefit from Interconnection — the direct and private traffic exchange between key business partners — for high performance and low latency.

Networking for Nerds: Do You Know the Difference between IP Peering vs. IP Transit for Enterprise Internet Interconnection?

IP peering is a mutual exchange of data between two ISPs, and the amount of data exchanged is typically close to equal. The respective ISPs do not charge for this arrangement as both parties benefit equally — this is known as settlement-free, and it simply means that neither ISP will pay the other under an agreement. IP transit is when one entity pays another for the right to transit its upstream network. In this arrangement, one entity is

A Practical Guide to Artificial Intelligence for the Data Center

Data center efficiency is about optimizing the physical world equipment to match the digital demand with the highest degree of accuracy possible. That means having the right number of servers, power, cooling needed to support demand in that location at that time. Predicting that demand across a distributed infrastructure will be far more challenging as the number of variables that impact it increase.

Riding the Rise of Distributed Artificial Intelligence Architectures

Artificial intelligence (AI) has been around since the 1950s, but it has recently grown into a real force in the digital transformation of businesses and our personal lives. From digital twins that create “living” digital simulation models of physical things (e.g., avatars for airplanes, cars, etc.) to voice recognition applications in smartphones and home assistants, machines are busy learning all there is to know about us and our world.

Paving a Path to the Promise of 5G

Cisco estimates that 5G connections will grow more than 1,000 percent, from 2.3 million in 2020 to over 25 million in 2021, mainly with edge devices, and is expected to drive very high traffic volumes — 4.7 times more than the average 4G connection by 2021. 

5 IT Predictions for Digital Business in 2019

And as business and technology leaders move closer to another year of high stakes digital transformations and the big IT decisions that power them, we’re taking a closer look at the technologies that will make the biggest digital business impact in 2019.

Why Network Functions Virtualization Should be Part of Your Infrastructure Strategy

Networking has played a critical role in digital transformation, evolving from now-primitive centralized connections to today’s distributed software-defined networks (SDN). Software-defined networking, an approach to cloud computing, simplifies network management and configuration through programming to improve network performance and monitoring.

Global Interconnection Index Predicts Energy Sector Interconnection Is About to Take Off

The oil rigs, power plants and service stations of the energy and utility sector conjure up the heavy metal industry of the 20th century more than the digital future of the 21st. But, in fact, this sector is ripe for digital transformation and the power of Interconnection, according to the second annual Global Interconnection Index (the GXI).

What Value does a Managed Security Operations Center Bring to Your Ecosystem?

In the Motiv SOC, all activities on the application and associated data are collected, analyzed and correlated in a centralized manner for its customers, so deviations can be recognized quickly and reported. Initially, the SOC service was mainly reactive, but Motiv is now focusing on real-time alerting to provide faster insights for customers to immediately analyze and solve potential security breaches.