The Future of IT: A Look at Blockchain and Quantum Computing

Innovation and great ideas can be instantly shared worldwide in the digital era, but even the most seamless electronic collaborations can’t replace the value of eye contact, a handshake and the chance to trade opinions and insights with respected peers face-to-face. That kind of information exchange is often inspiring, and Equinix and The Economic Council were looking to enable it when we recently partnered to host a delegation of German IT executives and members of the German and EU parliament in Silicon Valley.

New AWS Routes Open Up in NAP

Equinix’s MI1 facility, one of the densest colocation sites in the southern United States, is right in the center of that hub, creating rich opportunities for companies in the southern North American, LATAM and Caribbean markets and earning its title as the Network Access Point of the Americas (NAP). Now, MI1 is offering access to Amazon Web Services (AWS) for new growth opportunities for North and South American businesses.

Increase PII Security in the Cloud through Secure Key Generation & Management

Stored and accessible PII, which is broadly defined as any information that could be used to identify an individual, facilitates these transactions for all consumers. However, near-weekly reports of significant data breaches have raised concerns about the ability of retailers and other organizations to keep consumer records secure.

Open Banking Brings Opportunity, but How to Seize It?

By opening up consumer data and allowing access via APIs, PSD2 gives non-banking firms a chance to compete with banks in the digital payments business by building financial services platforms on top of the bank’s own data and infrastructure. For instance, a social media site could begin enabling people to pay bills there, or a FinServ firm could offer budgetary strategies based on complex analytics of personal income and spending data.

From the Ashes of the Corporate Data Center, A Place for IT Transformation Is Born

The enterprise owned-and-operated data center is on the endangered species list. But let’s not write any obituaries yet! Enterprises still have critical data center needs, but those needs are changing dramatically. Today, IT leaders are being called on to deliver high-performing, data-intensive, dynamic applications and IT services to users distributed globally.

It happened “long ago,” but does Star Wars preview future tech?

Here’s a look at four examples of cool Star Wars tech that are at least edging their way into reality, and why interconnection will be needed to move some of these concepts into the real world.

Improving Travel Experiences by Taking Aviation to the Digital Edge

At Equinix, we are seeing increased demand for airlines, airports and many other companies that form part of that ecosystem looking to tap into the power of keeping data closer. They are keen to ensure that the promise of digital doesn't become a disaster.

Is GDPR Overhyped?

So how can Equinix help companies of all sizes meet the challenges of GDPR compliance? First, with expertise. The reality is that GDPR and emerging privacy regulations globally affect every one of our customers, and our industry as whole.

Deploying Access Control and Segmentation for Greater Security at the Edge

Digital transformation is flipping IT architectures inside out, as data and content move from the private, centralized cloud and on-premises data centers to public cloud services and SaaS providers, beyond an enterprise’s current edge. For digital businesses this means the boundary between the digital and physical worlds is blurring at the digital edge, where commerce, population centers and digital ecosystems meet.

Can a KMS Minimize the Chance of a Data Protection Breach?

Guarding against data breaches becomes even more challenging as organizations move data and applications from the security of their on-premise IT infrastructure to the cloud, where the responsibility for protecting data is shared with the cloud provider. Because encryption keys play a vital role in this scenario by shielding data from potential breaches, the approach to encryption key management requires careful evaluation.