Category Archives: Cloud Hosting

When Do We Need MySQL Databases With Our Web Hosting?

Whenever you buy web hosting, your hosting provider is sure to include an option called “Databases” in his price quotation or package details. But not many of us know what are databases and why we need them when setting up a website. This article aims to explain a couple of reasons why we use databases and when we need them for our website.

The database systems we usually get with our web hosting accounts are all relational database systems or RDBMS. If we take a Windows hosting server we usually get Microsoft SQL aka MSSQL and if we take a Unix based system we usually get MySQL. Both these systems put your website data into tabular layouts for fast and easy retrieval.

Databases are a collection of rows and columns, where each row or column is related to the others in some way. Due to this relation, information from this database can be retrieved quickly and efficiently as compared to if the data was stored in any other unstructured format. You can consider a database as a collection of multiple spreadsheets which are all related to each other in some way or the other.

Security

A major advantage of having your data stored in a database is the ability to protect the database from unauthorized access, or the ability to protect a database record from being tampered with. A simple example would be the storage of login credentials. In a simple way, login credentials can be stored in a simple text file and be read by your script which does the authentication. However, your file will always save the password stored in plan text, making it vulnerable to anyone who has access to it. Databases have the ability to encrypt the entries using a hashing algorithm to obscure them. Further, to read or write to the database, you need to specify login details, something which is not easily possible with an ordinary text file or spreadsheet.

Efficiency

Due to the manner in which data is stored in the database, retrieval and storage is most efficient. Unlike a spreadsheet, where anything and everything can be stored in any cell, SQL restricts the type of information stored in each row or column based on certain conditions. This validation is inherent in the properties of SQL and is an added advantage for a programmer or developer. Due to the various inbuilt mechanisms that are present in RDBMS systems, they are the most preferred method of storage and retrieval of data.

An article on the DatabaseJournal Blog explains this in a lucid way:

“…The problem with text files is during a read, if the text file is large, it can take quite a bite of time to open and scan the contents of the file looking for what we want. Also, if we wanted to see all the sales to a specific customer, the entire text file would have to be read, and every line occurrence of the customer name would need to be saved in some temporary place until we had them all. If we saved to a spreadsheet instead of a text file, we would have a Sort feature built in. So we may be able to find all the sales to a specific customer quicker, but again, if the file was large, opening the spreadsheet could take a great deal of time.”

Administrative Control

Database systems also have various control mechanisms which allow easy administration of the database and tables within it. The most important part is user management. Each user can be given specific rights to the database, thereby allowing limitation in access so as to secure the data from being tampered, modified or altered. Database Administrator’s can tweak many settings of the database thereby restricting the flow of data, the connection speeds, maximum number of connections to the server and even adjust what hardware resources should be allocated for performing a task.

Buying Web Hosting Space From Your Web Designer? Watch Out

We all love to shirk responsibility and hand over some of our problems for people who are willing to handle them. Buying the right type of web hosting maybe quite an overwhelming process for a not so tech savvy business owner. The task of how muck disk space, how much bandwidth and all the technical jargon involved can get quite taxing to understand. This is a primary reason why web designers are more than happy to bundle a web hosting account along with their designing fees. But there are many ways in which such relationships can get sour if the terms of the bundling are not made clear initially. This article explains what could go wrong if you buy web hosting space from your web designer rather than buying it independently.

Buying Web Hosting Space From Your Web Designer? Watch Out

Buying Web Hosting Space From Your Web Designer? Watch Out

Price

Although you may feel that you’ve got a great package deal on your web hosting along with design fees, you should be aware that web hosting fees are recurring fees and usually payable monthly or annually. Don’t get carried away with the waiver of fees for the first year. Some website owners are in for a rude shock when the next year on the renewal anniversary, they receive a huge invoice for renewal of the web hosting account. Design firms are almost always resellers or affiliates of web hosting companies and never a web host themselves. This can be a positive thing as well as a negative thing. Sometimes they may be able to offer you a highly competitive pricing, while some of them may just exploit your ignorance or inability.

Lock In

Taking a package from your website developers may lock you in to their web hosting package as well as their design. More than a physical barrier, it creates a sort of psychological block which prevents you from switching services or choosing a different design for your website. This is precisely the reason why low cost packages are offered and customers are lured to them. Website owners fear that if they shift the design services, then the developers may not be too cooperative and not give them control of the hosting account. Similarly, even if the hosting account has limited features or provides bad service, you may be willing to stick to it if it is bundled with your development package. You should always have control of your hosting account and also have your design source code with you.

Support

If your web designer is knowledgeable, well equipped and efficient, you may get good technical support. Issues related to your website’s hosting will be solved quickly. But if your designers are new to the hosting world, they may not be of much help. Sometimes it maybe helpful to buy the hosting and design from the same company, so that all your services are under one roof. This way there can be no blame game as to which service is deficient, in case of a failure. However, this can also be a disadvantage if you have hired a nascent design firm. They maybe too raw to know the intricacies of hosting and may not be able to keep up with changing technologies or may not be competent to provide the right security or optimization measures. This should not be expected from them either, as designing is their primary business and all other things are side businesses.

Control

If you are taking a package deal, make things clear at the beginning. What happens if you decide to hire the services of another designer? Who keeps the control of the website? On whose name is the domain name and hosting registered? How do you login to control your website files? These are some of the basic questions that you should ask when you are offered such a deal. You don’t want to end up having a disagreement with your web designer, who turns off your website and takes control of your domain name, leaving you high and dry.

Web Hosting And Net Neutrality In A Nutshell

Web Hosting And Net Neutrality In A Nutshell

Web Hosting And Net Neutrality In A Nutshell

Net Neutrality is a phrase which is being sprayed all over the internet without providing a simple and clear explanation to the layman. Web Hosts are as affected by Net Neutrality decisions just like any ordinary internet user. Many people are quick to point out that Web Hosts also practice data discrimination and should be placed on the same guillotine as ISPs. However, this is not the case as there is a huge difference in providing Bandwidth and in providing a web hosting service. This article points out a couple of reasons why the Web Hosting industry also embraces Net Neutrality with open arms and why a comparison maybe equal to apples and oranges.

Low Entry Barriers

Unlike Internet Services in any country, it is pretty simple for a person to start a web hosting business. To become an ISP, there are several legal and business hurdles that one must cross. It’s not an easy task and needs deep pockets and great influence to start the business. It is on par with a Telephone Company or Electricity Supplier. On the other hand, starting a web hosting business can be done with little or no investment. Web hosting resellers don’t even need to own a server or commit any sales to start their business. A small or medium host can spend a couple of dollars every month and lease a hosting server. This means that to enter into this industry the cost is very low and regulation is negligible. There is no Government control or paper work that needs to be done to sell hosting space. This automatically increases the number of players in the industry.

Intense Competition

The low entry barriers cause such intense competition, that the ultimate beneficiary is the end user. If one web host starts acting restrictive, people can easily switch to another one without much ado. Due to customer-facing side of the business being virtual and online, there is easy accessibility and no physical hindrances to switching. However in most places around the world, the number of ISPs are miniscule and in rural areas there may not even be more than one or two. This kills the competitiveness of the business and gives a dominant position to the ISP, which can be misused to exploit subscribers. Often, when there are only a couple of ISPs operating, it leads to a sort of cartel and price fixing which cannot be questioned. Anti-competition laws around the world prohibit such behavior and try to break up this dependence.

Cut-throat Pricing

Besides striving to offer the best service in terms of speed and resources, every web host aims to offer the best price too. The price-war is so aggressive that even customers find it hard to make a decision as they are spoilt for choice. This is exactly what ISPs don’t want. ISPs want to create restrictions among different website services or online facilities by throttling the popular ones and charging a premium for them.They may either recover the premium from the customers or may ask the web services to cough up that money. If a web host throttles traffic for a certain type of domain name and prioritizes traffic for one that he is selling Eg: .co domain names, then he will soon be out of business because all his clients will switch. As we have learnt from free online services, the consumer doesn’t like to be restricted. The more restrictions you place, the more they will shun your service.

Security and Convenience

Web Hosts do restrict certain type of traffic and also do some filtering, but this is not to create unfair competition or to get a dominant position advantage, but to ensure security and stability of their services. Eg: A host may limit simultaneous FTP connections from a single IP address to a maximum of 50. This is to prevent abuse of their FTP server and to ensure that other users on the same shared server are able to enjoy the service too. ISPs want to filter traffic to commercially exploit the end user, as they know that the end user has limited options for accessing the internet.

How You Maybe Contributing To Email Scams?

How You Maybe Contributing To Email Scams?

A large number of email users have been victims of online scams through emails and internet media. Many users have suffered financial loss, while others were just saved from getting an empty wallet. But despite this, there are many email users who are careless and negligent about the security of their email account, thereby jeopardizing the security of other email and internet users and encouraging hackers and attackers in having a free hand at mischief. This article explains how you also maybe contributing to email scams and email spam by being negligent about security. Are you going to be a victim or an accomplice?

Weak Passwords

Using the same password for all your email accounts can be make a successful attack exponentially damaging. It is like having a common key for all your assets, including your car, your garage, your front door and back door. If someone gets hold of the key, they can do quite a lot of damage. Having a weak password for your email account makes you as vulnerable. In 2014 the most commonly used password was ‘123456’. SplashData’s list of frequently used passwords shows that many people continue to put themselves at risk by using weak, easily guessable passwords.

“Passwords based on simple patterns on your keyboard remain popular despite how weak they are,” said Morgan Slain, CEO of SplashData. “Any password using numbers alone should be avoided, especially sequences. As more websites require stronger passwords or combinations of letters and numbers, longer keyboard patterns are becoming common passwords, and they are still not secure.”

Phished!

Having your email account compromised is not the end of the attack. Your email address is most likely going to be used as a tool to attack other unsuspecting email account holders who have also not taken security seriously. Attacks on your email account cascade into attacks on email systems which can further snowball into attacks against an entire ISP. Credit Card Frauds, Net Banking Scams, High Security Facility Penetration and many other similar scams take place on a regular basis due to compromised email systems. You can use a time-tested spam filtering such as SpamAssassin to remove unwanted email from entering your inbox and junk folders. It is also important to know how to identify junk mail even if it’s from a trusted source. Carefully identifying a malicious email can help to fight spam and scams.

Bad Security Practices

Opening emails from someone you don’t know or don’t trust is a bad practice. Sending any sensitive information or exceptionally personal information over email can also be damaging. Replying to, clicking on links within, or even unsubscribing from spam emails typically only informs the sender that they have found an email address to which they’ll send more spam emails or target in future. Report the message as spam instead.

Being alert and attentive about email activity and suspicious behavior of your email account can help make the internet safer for other email users as well and prevent spam mail, phishing scams and also harassment.

A Simple Explanation Of What Big Data Is

A Simple Explanation Of What Big Data Is

Big Data has become a new buzz word in the IT industry. Everyone is talking about it and repeatedly using it to impress others, even if they themselves don’t really know what it means. Big Data is often used out of context and more as a marketing gimmick. This article aims to explain what Big Data really is and how it will be useful in solving problems.

Physics and Mathematics calculations can give us the exact distance from the East Coast of USA to the West Coast, accurate to about 1 yard. This is a phenomenal achievement and has been applied to various technologies in our daily life. But the challenge comes in when you have data which is not static, which is constantly changing and changing at a rate and in volumes which are humongous to determine in real time. The only way we can process this data is by using computers.

IBM data scientists break big data into four dimensions: volume, variety, velocity and veracity. But there are many more aspects of Big Data. Big data can be described by the following characteristics:

Volume is the size of the data which determines the value and potential of the data under consideration and whether it can actually be considered as Big Data or not. Variety means that the category to which Big Data belongs to is also a very essential fact that needs to be known by the data analysts. This helps the people, who are closely analyzing the data and are associated with it, to effectively use the data to their advantage and thus upholding the importance of the Big Data. Velocity refers to how fast the data is generated and processed to be useful. Variability of the data can also be a problem for the analysts. Veracity is the quality of the data being captured. Accurate analysis depends on the veracity of the source data.

Analogies

An article on the Tibco Blog provided a very simple analogy to understanding what Big Data really is. Their blog says that:

“One analogy for Big Data analysis is to compare your data to a large lake… Trying to get an accurate size of this lake down to the last gallon or ounce is virtually impossible… Now let’s assume that you have built a big water counting machine… You feed all of the water in the lake through your big water counting machine, and it tells you the number of ounces of water in the lake… for that point in time.”

A better, more visual analogy is presented by Paul Lewis of Hitachi Data Systems. He often explains about Big Data by showing a picture cartoon filled with hundreds of people who are doing different things in the picture, looking busy. He explains:

“You need to find the person with the suitcase of money (Value)…but there are many people (Volume), all walking at various speeds running to work (Velocity), from all walks of life (Variety), some are crooks (Veracity).”

Importance and Benefits

One of the major reasons why we need Big Data is for prediction and analysis. One of the best examples where Big Data can be seen in action is the Large Hadron Collider experiment, in which about 150 million sensor deliver data 40 million times per second. After filtering and refraining from recording more than 99.999% of these streams, there are 100 collisions of interest per second. Another important example is Facebook, which handles over 50 billion user photos.

Healthcare is another area where Big Data can play a significant role. One of the most amazing example is Google Flu Trends, which analyses search data from various locations and uses the Big Data Analysis to identify patterns of Influenza epidemics and endemics around the world. Although this data is not necessarily accurate or may have a lot of false positives, it highlights the potential of what Big Data can show you.

A key benefit of Big Data is that there is no specific format in which it is stored. Crudely put, it is a raw dump of data i.e. it is unstructured. The system uses complex algorithms to classify and process this data, which makes it very special.

Why you should think thrice before taking a Dedicated Server

We are all prone to wanting more in almost everything life offers. This is also common to buying website hosting - we want more. More hosting space, more processing power, more RAM and more bandwidth as well. We want a bigger, meaner machine which has all the bells and whistles that your money can buy. But we rarely stop to think, whether we really need it and whether that is really the solution to everything. This article tries to reason why you should rethink your purchase of a Dedicated Server for your website or web application.

Why you should think thrice before taking a Dedicated Server

Misled by Developers

The most common cause of goofing up a dedicated server decision is due to being misled by your software developers or designers. Many a time, they have no clue how much of the resources they will really need and want to save themselves the trouble of migrating your data at a later stage, hence they coax you into believing that you need a monster configuration server which will magically solve all your problems. The less experienced the developer is, the less empirical or statistical evidence he will show you, for justifying the purchase. 3 years back, we received an email from a friend, asking us for a very high configuration machine. When we realized he was being guided by his developer, we suggested that they do a trial run on a small 5 GB shared hosting account. Till date, they have not needed more than that and are very happy we saved them the huge expenditure.

Warped Estimates

Before we suggest a Dedicated Server, we request the client to send us an estimate of his requirements and how he has come to that conclusion. Most of the time, the client has made wrong calculations and drastically changed the entire estimation by using predicted figures, which may not actually work in a production environment. This may mean that he has either under-estimated the requirement and will need to upgrade the server in the short term or he has overestimated the requirements and goes for an overkill solution. There are numerous benchmarking tools, which can help predict the exact amount of resources that the website or application requires and also helps test the limit of those resources.

Over-ambition

In the past few years we have often heard from atleast 10 different clients, that their future plan is to make an “online portal like Facebook”. While that may seem like a very progressive thought, it is often accompanied by a lack of planning and exaggeration. Ofcourse everyone wants to be the best, but they want to do it overnight, without looking into the path travelled by the industry giants. This over ambition eclipses their decision of doing some realtime tests and then jumping into the project in full swing. We often see that those who take a dedicated server, drop the idea by the 5th or 6th month, when they realize that their requirement was miniscule or their goal is not achievable at the time.

Laziness to troubleshoot

Another common reason why people want to go in for a Dedicated Server is because they don’t want to get down to the root of the issue of high resource usage, but instead would like to work around the issue by pumping in more hardware resources. A blaring example would be that of a small time ecommerce portal, which was so badly coded that the SQL queries kept getting throttled due to being slow, clumsily written and buggy. Rather than modifying the query to its optimum best, the webmaster chose to add more CPU resources by upgrading the server. This solved the problem for a few weeks, till the query started taking more time. Thereafter he went in for a better configuration server. This time, in a few weeks the same problem cropped up and he realised that the problem lay in his SQL coding and not in the server. He has now happily switched to shared hosting and has got the SQL beautifully optimized. His laziness definitely cost him time and money, but it also made him wiser for the long-term.

When Should I Shift From Shared Hosting To A VPS?

When Should I Shift From Shared Hosting To A VPS?

With storage and data processing moving online, web hosting is becoming more advanced by the day. but the overwhelming set of options leaves the end user spoilt for choice and also confused at the variety of options. A frequently asked question that we often hear is when should a customer shift from Shared Hosting to a VIrtual Private Server or VPS.

Root Access

A major concern for people on shared hosting is that they want to have all the control. They want to know what’s going on with the box that is hosting their website, what is the system status, what version of each software there is, what software should be there, who has access to the box, what hardware should be attached to it and so on. Some software or web applications genuinely require you to have root access to install certain add-ons or to configure some server-wide settings. These settings are such that they would not be permitted on a Shared Host due to its adverse impact on other websites sharing the same server and being affected by the configuration change. Shared Hosts need to keep a check and balance of all the software that will affect their system’s, because they are answerable to all their customers.

Isolation and Testing

Another important reason for switching to a VPS is to have your entire application, file system and maybe even network isolated from others. This maybe due to the sensitive nature of the application or the information stored on the server or may simply be to conduct some tests or experiments. Penetration testing on websites is done by creating a VPS with a mirrored version of the website, so that the actual website is not affected. Even firewalls and protection systems need to be tested in isolation. Testing the Operating System Kernel or making a change in the core files of an OS can be quite risky. No host will allow you to play around with their live servers.

Customized Requirements

When the software developer needs a specific set of requirements, like a specific Operating System or a specific Database Management System, then the conventional shared hosting may just not be the right option. Many a time the right combinations are also not available for developers. A specific database (DBMS) variant may not be available with any hosting company because it isn’t popular. Similarly no host will support a customized Linux version. This means that you will have to install and manage it yourself. If you don’t need to control the hardware of the box, then it makes no sense going in for a Dedicated Server - a VPS would be the ideal choice.

Selling a Service

If you are selling a hosted service, like a web application or an online software or an ecommerce platform, it’s best for you to take a VPS, if not a Dedicated Server itself. The VPS helps you to have full control and flexibility in managing the system and monitoring all aspects of your IT infrastructure. Those selling a “Software as a Service” are sure to need either a VPS or a Dedicated Server. Infact they should not use Shared Hosting which can be affected by various external factors as well as by other users on the same system. VPS systems can be easily migrated to a Dedicated Server and can be put into a production environment easily.

The decisive factor in choosing a VPS over a Dedicated Server is usually the price. A VPS is not a physical machine and hence shares the physical resources with other VPS systems. Whereas a Dedicated Server gives you ultimate control of even the hardware that is running your systems.