HostGator Blog | Gator Crossing http://blog.hostgator.com The Official HostGator Company blog Fri, 24 Oct 2014 20:11:16 +0000 en-US hourly 1 The Ideal Job http://blog.hostgator.com/2014/10/23/ideal-job/ http://blog.hostgator.com/2014/10/23/ideal-job/#comments Thu, 23 Oct 2014 09:22:01 +0000 http://blog.hostgator.com/?p=8830 The post The Ideal Job appeared first on HostGator Blog | Gator Crossing.

There are three types of people in this world: those who work because it gives them a sense of purpose and fulfillment; those who work because they have to, but would rather not be working; and those who aren’t working at all.

It could be argued that these three different types of people exist based on the amount of personal responsibility that they feel for themselves and their lives, with the first group being overly responsible, driven almost to the point of a neuroses, the second group being responsible enough to know that work comes before play, and the third group who never had a sense of responsibility instilled in them at all.
The fact of the matter is that given the option, no one wants to work, not really. They want to be doing something that they enjoy; if they get paid for it, so much the better. No one really wants to work, but we do.
 
Doing What You Love, Loving What You Do
The most successful companies are those with high levels of employee morale, and one of the best ways to have high employee morale is to ensure that management morale is high. Though this may seem ...

web hosting

]]>
The post The Ideal Job appeared first on HostGator Blog | Gator Crossing.

There are three types of people in this world: those who work because it gives them a sense of purpose and fulfillment; those who work because they have to, but would rather not be working; and those who aren’t working at all.

It could be argued that these three different types of people exist based on the amount of personal responsibility that they feel for themselves and their lives, with the first group being overly responsible, driven almost to the point of a neuroses, the second group being responsible enough to know that work comes before play, and the third group who never had a sense of responsibility instilled in them at all.

The fact of the matter is that given the option, no one wants to work, not really. They want to be doing something that they enjoy; if they get paid for it, so much the better. No one really wants to work, but we do.

 

Doing What You Love, Loving What You Do

The most successful companies are those with high levels of employee morale, and one of the best ways to have high employee morale is to ensure that management morale is high. Though this may seem silly, research has indicated that the greater the morale of the owners of the company and the managers within the company, the more likely the overall morale of the company will be high.

When thinking about starting up a company, don’t just concern yourself with that which will make the most money, concern yourself with that which you love. You will be the most successful doing what you love as it won’t feel like work to you. Everything will be something that you want to do. Sure, there may be some tasks that you’re not particularly fond of, but even when you sit down to get those done, they won’t truly seem like work, given the fact that they are associated with what you want to be doing.

 

Finding Others

When looking for others to work for your company, now that you’ve got it off the ground and have started nurturing it into the size you want it to become, don’t just look for those with the fanciest resume, look for those who genuinely enjoy the work.

Silly as it may sound, there are those who enjoy all different kinds of work; if you look, you will find someone who loves data entry, you will find someone who loves accounting, and (say your company is in charge of making gizmos), you will find someone who not only loves gizmos, but genuinely enjoys the work that you want them to be doing in regard to gizmos. You may find an accountant who plays with gizmos in her spare time, or a teenager who has a gizmo collection and is a whiz at data entry.

Employee morale is dependent upon the overall morale of the company; if everyone there loves what they do, then the company itself will assuredly be a success. With everyone enjoying their jobs, it creates not only a pleasant work environment for the individuals who work there, but for your customers, as they will not be made to feel as though they are the burden. Happy employees make for happy customers, which in turn makes for a high revenue stream.

Don’t discount a worker because they have worked in a cubicle for the past five years but is applying at your company because they have liked gizmos as a child; chances are that this individual will be a better candidate. And with everyone doing what they love, everyone wins.

 

Image Source: Swiss Fit Chick. (2014). Do What You Love Quote. Retrieved from https://swissfitchick.files.wordpress.com/2014/05/do-what-you-love-quote.jpg

web hosting

]]>
http://blog.hostgator.com/2014/10/23/ideal-job/feed/ 0
Happy 12th Birthday, Snappy! http://blog.hostgator.com/2014/10/22/happy-12th-birthday-snappy/ http://blog.hostgator.com/2014/10/22/happy-12th-birthday-snappy/#comments Wed, 22 Oct 2014 05:01:12 +0000 http://blog.hostgator.com/?p=8797 The post Happy 12th Birthday, Snappy! appeared first on HostGator Blog | Gator Crossing.

It seems like only yesterday that our beloved blue gator was crawling around the swamp, still in diapers. Oh, how time flies!

Twelve years ago today, the HostGator.com domain was registered and thus Snappy was born. We like to mark this occasion each year with a something special.
This year we’re extremely happy to officially announce our new Texas datacenter! All new hosting accounts are now being provisioned right here in Houston, Texas, at CyrusOne!
CyrusOne features redundant power and cooling, along with state-of-the-art security and virtually everything one could ask for in a new datacenter. We’re very proud to be back home in Texas with CyrusOne!
Not only are we in a brand new data center, but Snappy is offering special discounts in celebration of his birthday! All new hosting plans with 6-month billing cycles are 65% off. All new hosting plans with billing cycles of other than 6-months are 45% off.
There’s even more great birthday news! Existing customers are welcome to take advantage of these discounts as well, please see this FAQ for full information.
To sign up, simply visit http://www.hostgator.com! This sale ends at 11:59p CST tonight (Wednesday, October 22, 2014).
Happy ...

web hosting

]]>
The post Happy 12th Birthday, Snappy! appeared first on HostGator Blog | Gator Crossing.

It seems like only yesterday that our beloved blue gator was crawling around the swamp, still in diapers. Oh, how time flies!

Twelve years ago today, the HostGator.com domain was registered and thus Snappy was born. We like to mark this occasion each year with a something special.

This year we’re extremely happy to officially announce our new Texas datacenter! All new hosting accounts are now being provisioned right here in Houston, Texas, at CyrusOne!

CyrusOne features redundant power and cooling, along with state-of-the-art security and virtually everything one could ask for in a new datacenter. We’re very proud to be back home in Texas with CyrusOne!

Not only are we in a brand new data center, but Snappy is offering special discounts in celebration of his birthday! All new hosting plans with 6-month billing cycles are 65% off. All new hosting plans with billing cycles of other than 6-months are 45% off.

There’s even more great birthday news! Existing customers are welcome to take advantage of these discounts as well, please see this FAQ for full information.

To sign up, simply visit http://www.hostgator.com! This sale ends at 11:59p CST tonight (Wednesday, October 22, 2014).

Happy birthday, Snappy!

web hosting

]]>
http://blog.hostgator.com/2014/10/22/happy-12th-birthday-snappy/feed/ 0
A Cyber Security Toolkit For Your Small Business http://blog.hostgator.com/2014/10/20/cyber-security-toolkit-small-business/ http://blog.hostgator.com/2014/10/20/cyber-security-toolkit-small-business/#comments Mon, 20 Oct 2014 16:56:12 +0000 http://blog.hostgator.com/?p=8781 The post A Cyber Security Toolkit For Your Small Business appeared first on HostGator Blog | Gator Crossing.

As unfortunate as it may be to say, 2013 marked a monumental year in data breaches, mainly for businesses that weren’t prepared with the necessary level of cyber security. According to Symantec’s annual Internet Security Threat Report there was a 493% increase in stolen identities since 2012, amounting to over 550 million affected customers.
Many remember recent headlines involving breaches in Apple’s iCloud, but most of us will never hear about the smaller targets data thieves have been cleaning out due to the lack of media attention. The National Small Business Association put out a survey, through which they found nearly half of all small businesses reported being victim of a cyber-attack.
With a reported 66% of all small businesses depending on the internet for day to day operations, there is still a resounding unawareness to to how damaging a data breach can be to your company’s future and reputation.
Thankfully those coding for cyber security are always a few steps ahead. October is recognized by the Tech Community as National Cyber Security Awareness month, so we wanted to compile a comprehensive guide for small businesses to prevent any such data breaches from occurring as we head towards the end of 2014.
Using four ...

web hosting

]]>
The post A Cyber Security Toolkit For Your Small Business appeared first on HostGator Blog | Gator Crossing.

Cyber Security Toolkit
As unfortunate as it may be to say, 2013 marked a monumental year in data breaches, mainly for businesses that weren’t prepared with the necessary level of cyber security. According to Symantec’s annual Internet Security Threat Report there was a 493% increase in stolen identities since 2012, amounting to over 550 million affected customers.

Many remember recent headlines involving breaches in Apple’s iCloud, but most of us will never hear about the smaller targets data thieves have been cleaning out due to the lack of media attention. The National Small Business Association put out a survey, through which they found nearly half of all small businesses reported being victim of a cyber-attack.

With a reported 66% of all small businesses depending on the internet for day to day operations, there is still a resounding unawareness to to how damaging a data breach can be to your company’s future and reputation.

Thankfully those coding for cyber security are always a few steps ahead. October is recognized by the Tech Community as National Cyber Security Awareness month, so we wanted to compile a comprehensive guide for small businesses to prevent any such data breaches from occurring as we head towards the end of 2014.

Using four levels of protection will ensure your data stays safe.

 

Securing Your Foundation

Regardless of how big your business is, there are mandatory steps to ensuring the foundation of your cyber security is rock solid. Just like you lock away your valuable possessions, you’re going to need to categorize and document what digital files you’re keeping in vulnerable areas. These categories should be broken down like this:

  • Highly Confidential – All of your most sensitive data should be placed in this tier. This includes anything that if stolen could impact your customers, employees, or business as a a whole. Think identity information, things like: passwords, social security numbers, credit-card info, or names and addresses.
  • Sensitive – The fine line between sensitive and highly confidential is what couldn’t destroy something if stolen in the financial sense. Sensitive documents are things you wouldn’t want seen externally of your business for privacy reasons. Reports on your employees, marketing plans, contact info, or performance data are all sensitive and would be best stored separately.
  • Internal Use Only – Information that is available to all your employees, but still would be best unknown to the public can be classified as internal only. This data may not harm your company, but still is considered items you won’t post publicly.

 

Securing the foundation also means safeguarding all your devices, should a hard drive or thumb device get lost.

 

Level 1 Threat Protection

  1. Restrict Access Points - Knowing which data is the most sensitive will help in choosing who can access it, the less people capable of opening the bridge the less likely a hacker will be able to get in. Always be conservative here, if there’s a document someone will need there will usually be an Admin capable of getting it for them.
  2. Train Employees On Digital Security Basics - Using email, and having to download software isn’t always black and white in terms of what is safe, and what might have some nasty malware zipped up inside. Provide the resources necessary to help your company recognize what threats may be present in the forms of phishing schemes, identity thieves, or even scammers calling in over the phone.
  3. Consider Storing Data On A Device Disconnected From Any Network – If your company has no reason to transfer crucial data remotely, don’t make it available anywhere except in the office, on a machine where employees can access it in person.
  4. Use Reputable Free Software- Not all Cyber Security comes with a hefty subscription fee, check out some verified by the National Cyber Security Alliance on this list.

 

Level 2 Protection

  1. Two-Factor Authentication – This is for the most sensitive data. Not only will employees need a password, they will also need a second step such as a PIN number, or ID card.
  2. Encryption - Encryption essentially mixes up data to look like a bunch of nonsense to those unauthorized to access it. The encryption you use will need to meet the Federal Information Processing Standard (FIPS-Certified), otherwise there’s still potential hackers can read the data by cracking your key.
  3. Hire A Security Specialist - This might mean paying to send a current employee to get certified as a security compliance officer, or consulting a local IT Professional to secure all the devices and networks with current protection capabilities.

 

Level 3 Protection

  1. Physical Facility Lock Down – Despite the transcendence into digital storage and remote access points, much of what can be stolen is still buried in physical machines and data units that can be broken into once removed from your facility. Preventing criminals from entering your building altogether cuts down the possibility what’s inside can be accessed.
  2. Consult Security Tests - Hiring an outside specialist who knows how to test infiltration points is your best friend when it comes to knowing for sure whether or not your system’s security is air tight. If they can get in, you’re not losing everything, and will know what to improve upon.
  3. Personal Device Protocol – Personal electronic devices can be detriments to certain access points. Smart phones that employees have connected to the wifi is as simple as it gets to allowing hackers to tap the network and get whatever data they want being transferred between the device and server. Your IT team can set up minimum security requirements so these outside devices won;t be able to access the network in the first place.

 

Small businesses have it especially tough when it comes to maintaining the security of their data. One breach can ruin the trust of an entire community, which is usually how small businesses thrive in the first place. Don’t allow your business to suffer.

web hosting

]]>
http://blog.hostgator.com/2014/10/20/cyber-security-toolkit-small-business/feed/ 0
SSLv3 Security Vulnerability aka POODLE http://blog.hostgator.com/2014/10/14/sslv3-security-vulnerability-aka-poodle/ http://blog.hostgator.com/2014/10/14/sslv3-security-vulnerability-aka-poodle/#comments Wed, 15 Oct 2014 04:27:34 +0000 http://blog.hostgator.com/?p=8759 The post SSLv3 Security Vulnerability aka POODLE appeared first on HostGator Blog | Gator Crossing.

Tonight Google announced a flaw in the design of SSL v3. We have been tracking this issue after we heard whisperings in private security circles last week. Upon disclosure of the details we began remediating immediately.
The vast majority of end users should not experience any issues as a result of the changes we’re making. In fact, Google estimates this change will affect less than 1% of the internet. (The SSL 3.0 protocol is almost 15 years old but has remained in place to support users running older browsers.)
The attack vector for this vulnerability has prerequisites and is very sophisticated. As such, the real world severity is far below the recent Heartbleed & Shellshock vulnerabilities.
Check out Google’s Security blog for details.
If you would like to be 100% protected, you can disable SSLv3 in your browser settings. Information on how to do this in a few popular browsers can be found here.
 
*****
Patrick Pelanne is Endurance’s Vice President in charge of System Operations. Previously he has served as HostGator’s Chief Operating Officer and HostGator’s Deputy Chief Technical Officer.

web hosting

]]>
The post SSLv3 Security Vulnerability aka POODLE appeared first on HostGator Blog | Gator Crossing.

Tonight Google announced a flaw in the design of SSL v3. We have been tracking this issue after we heard whisperings in private security circles last week. Upon disclosure of the details we began remediating immediately.

The vast majority of end users should not experience any issues as a result of the changes we’re making. In fact, Google estimates this change will affect less than 1% of the internet. (The SSL 3.0 protocol is almost 15 years old but has remained in place to support users running older browsers.)

The attack vector for this vulnerability has prerequisites and is very sophisticated. As such, the real world severity is far below the recent Heartbleed & Shellshock vulnerabilities.

Check out Google’s Security blog for details.

If you would like to be 100% protected, you can disable SSLv3 in your browser settings. Information on how to do this in a few popular browsers can be found here.
 

*****

Patrick Pelanne is Endurance’s Vice President in charge of System Operations. Previously he has served as HostGator’s Chief Operating Officer and HostGator’s Deputy Chief Technical Officer.

web hosting

]]>
http://blog.hostgator.com/2014/10/14/sslv3-security-vulnerability-aka-poodle/feed/ 2
Which Is Easier To Learn, Java Or Python? http://blog.hostgator.com/2014/10/13/easier-learn-java-python/ http://blog.hostgator.com/2014/10/13/easier-learn-java-python/#comments Mon, 13 Oct 2014 15:56:48 +0000 http://blog.hostgator.com/?p=8750 The post Which Is Easier To Learn, Java Or Python? appeared first on HostGator Blog | Gator Crossing.

When it comes to learning an object-oriented programming language, you might consider starting with either Python or Java. While Python can be more user-friendly than Java, as it has a more intuitive coding style, both languages do have their unique advantages for developers and end users. However, if you are just beginning your path towards a programming career, you might want to start by learning Python, as it is less complex. On the other hand, you will be ahead of many of your colleagues if you are able to understand both. With that in mind, here are the main similarities and differences.
 
Java
Java is unique in its own way and for an advanced programmer, no problem to use. The first Java version 1.0 was released in 1995. By 2004, Java 5.0 was released; this version saw the insertion of generics into the Java language, providing Java with more efficient code and type safety. To date, the latest version of Java is SE 8, and it made its debut in 2014.
Currently, it is widely used as the key programming platform on smartphones and tablets. Additionally, Java programming language forms a large part of the basis for Android’s operating systems. Java syntax is ...

web hosting

]]>
The post Which Is Easier To Learn, Java Or Python? appeared first on HostGator Blog | Gator Crossing.

Which Is Easier to Learn Java or Python

When it comes to learning an object-oriented programming language, you might consider starting with either Python or Java. While Python can be more user-friendly than Java, as it has a more intuitive coding style, both languages do have their unique advantages for developers and end users. However, if you are just beginning your path towards a programming career, you might want to start by learning Python, as it is less complex. On the other hand, you will be ahead of many of your colleagues if you are able to understand both. With that in mind, here are the main similarities and differences.

 

Java

Java is unique in its own way and for an advanced programmer, no problem to use. The first Java version 1.0 was released in 1995. By 2004, Java 5.0 was released; this version saw the insertion of generics into the Java language, providing Java with more efficient code and type safety. To date, the latest version of Java is SE 8, and it made its debut in 2014.

Currently, it is widely used as the key programming platform on smartphones and tablets. Additionally, Java programming language forms a large part of the basis for Android’s operating systems. Java syntax is primarily a derivative from C++ and combines universal, organized and object oriented programming that offers automatic memory management. Using Java byte-code is advantageous to porting since it has similarities to machine code. Other benefits to Java include:

•Static typing
•Curly braces used for noting the start and end of functions
•Programs are larger
•Does not compile native bytecode
•Can be run on any operating system that can run the Java Virtual Machine
•Cannot change data types of variables
•Object-oriented programming is mandatory

 

Python

Python was first released in 1989. As a high-level programming language, it makes a strong case for readable code. In addition to supporting object-oriented programming, it also supports imperative and functional programming. This multi-paradigm language is also structure supportive. It offers ‘meta-programming’ and ‘logic programming,’ as well as ‘magic methods.’ Other features include:

•Duck typing (Strongly typed)
•Uses whitespace to convey the beginning and end of blocks of code.
•Programs are small and therefore run much faster
•You need less code to create a program
•This program is slow in execution
•Compiles native bytecode
•You can assign a string to a variable that once held an integer
•Easier to read and understand relative to Java
•Is not supported across a wide variety of platforms
•Object-oriented programming is optional

 

Variances

Both of these development programs come with their strong suits. While Java allows you to enjoy cross-platform support, you can still execute Python on at least 10 different operating systems. You need to determine what your end goal is before you decide on which program to use. Java, however, is not recommended for beginners as it is a more complex program. Python is more forgiving as you can take shortcuts such as reusing an old variable.

Additionally, many users find Python easier to read and understand than Java. At the same time, Java code can be written once and executed from anywhere. A benefit to the Java platform is that it lets you download questionable code and run it in a secure environment, which cannot affect its host system. Furthermore, Java is network-centric, meaning you can create network-based applications.

Whichever you choose to learn is based upon your preferences, determination, and background. If you already comprehend the basics of Python, you might want to expand upon your knowledge before moving on to Java. However, if you have the time and will, learning Java allows you to program for a wide variety of environments that might make it more fulfilling in the long run.

*****
Author Bio:
Natalie Lehrer is a senior contributor for CloudWedge. In her spare time, Natalie enjoys exploring all things cloud and is a music enthusiast. Follow Natalie’s daily posts on Google Plus, Twitter @Cloudwedge, or on Facebook.

 

Image source: https://www.flickr.com/photos/ahayward/21203103/in/photolist-2SEWK-gu8vyH-9dampt-gu9efE-gu8wyi-gu82cw-gu9eKC-gu9pbP-gu98Fd-gu8wge-gu8QvR-gu93vo-gu9e7o-6Fypq-9H4Sh6-4p3T96-2SEWd-chREkJ-ez4jVd-gu9fpa-gu87nS-gu9ntk-gu8XML-gu8MRx-gu8Ryx-gu988E-gu9cke-gu9eca-gu9oRv-gu88r5-gu95sj-6hJWKV-gu82XE-gu8RZx-gu8NJz-gu9hst-gu8SHh-gu8c5C-gu9ubZ-gu9tTz-gu9w4X-gu8Xa3-gu8a5f-gu8CPp-gu9env-gu8Ayc-gu7Z6N-gu8Ex4-gu9aHE-gu86V9

web hosting

]]>
http://blog.hostgator.com/2014/10/13/easier-learn-java-python/feed/ 0
Scheduling Hassles Are Disappearing http://blog.hostgator.com/2014/10/06/scheduling-hassles-disappearing/ http://blog.hostgator.com/2014/10/06/scheduling-hassles-disappearing/#comments Mon, 06 Oct 2014 11:16:14 +0000 http://blog.hostgator.com/?p=8734 The post Scheduling Hassles Are Disappearing appeared first on HostGator Blog | Gator Crossing.

Scheduling
Scheduling matters. It’s a concept that everyone is made aware of from an early age; first with working to make sure that you’re up and dressed and ready to go for school on time, and later as a busy entrepreneur, a seasoned CEO, or as a new start-up owner. It doesn’t matter what your position is in the world, from the time that you’re old enough to go to school, you have a basic concept of what a schedule is, and that you’re supposed to be on one.
As you get older, these schedules become more and more important. You’re no longer on your own time as you were when you were a child on those lazy days of summer; the doctor can only see you at a set time, you’ve got to be at work at a certain time, and you’ve got that conference call at a certain time. Everything is on someone’s schedule.
 
Partial Systems
Over time, you come to have a system; that system may be sticky notes all over the place, a calendar on the wall in the kitchen, or even a reminder programmed into your phone. Still, you’ve got to remember to add all those important tasks to ...

web hosting

]]>
The post Scheduling Hassles Are Disappearing appeared first on HostGator Blog | Gator Crossing.

google now

Scheduling

Scheduling matters. It’s a concept that everyone is made aware of from an early age; first with working to make sure that you’re up and dressed and ready to go for school on time, and later as a busy entrepreneur, a seasoned CEO, or as a new start-up owner. It doesn’t matter what your position is in the world, from the time that you’re old enough to go to school, you have a basic concept of what a schedule is, and that you’re supposed to be on one.

As you get older, these schedules become more and more important. You’re no longer on your own time as you were when you were a child on those lazy days of summer; the doctor can only see you at a set time, you’ve got to be at work at a certain time, and you’ve got that conference call at a certain time. Everything is on someone’s schedule.

 

Partial Systems

Over time, you come to have a system; that system may be sticky notes all over the place, a calendar on the wall in the kitchen, or even a reminder programmed into your phone. Still, you’ve got to remember to add all those important tasks to that calendar, into your phone, or write them down. The human mind can only remember so many things. If there’s not a system in place, it becomes easy to forget (“failing to plan is planning to fail,” after all). Little things, it may be argued, are okay to forget: failing to pick up an item out of the twenty you need from the grocery store is one thing, but failing to meet your boss to talk about a raise is something else entirely.

 

Tools

With today’s digital world, there are a host of different programs available that work to ensure that you can keep track of the events that make up the fifteen minute blocks of time that your days have been regulated to; still, in order for these tools to work, they require you to remember to input that information into their program.

Every email client and every online email provider has a calendar equivalent that can be utilized, and there are hundreds more that come in the form of apps or programs that may be installed; and yet, none of these are intuitive enough to be able to take your life and act as a secretary, at least, not until now. For those of you who use Gmail, there is a new light on the horizon; if you use Google’s Calendar, Google Now will take the conversations you have in your email and infer calendar events, asking you automatically if you want these events added to your calendar. What’s more is that the program will likewise notify you, based on how you setup the notifications, in advance, thus ensuring that you don’t miss an event simply because you forgot. The program will take everything from confirmation emails regarding travel plans to your message to your next door neighbor asking if he wants to get together for a barbecue on Saturday night and prompt you to see if you want the event added.

Now, it won’t create the events automatically, and if you forget after the notification, it’s hardly the program’s fault, but the fact of the matter is that this is a far more intuitive method than others currently available. Combine this with Google’s ability to setup business email addresses for the company, and you have a way to work to ensure that your employees will be able to make all their meetings without issue. While it’s not the be all and end all for all people, it does offer an additional means of working to ensure that your business runs smoothly, regardless of what that business is.

web hosting

]]>
http://blog.hostgator.com/2014/10/06/scheduling-hassles-disappearing/feed/ 0
Performance Testing: Latency, Load, Stress, or Soak? http://blog.hostgator.com/2014/10/02/performance-testing-latency-load-stress-soak/ http://blog.hostgator.com/2014/10/02/performance-testing-latency-load-stress-soak/#comments Thu, 02 Oct 2014 15:02:20 +0000 http://blog.hostgator.com/?p=8547 The post Performance Testing: Latency, Load, Stress, or Soak? appeared first on HostGator Blog | Gator Crossing.

How well does your web hosting perform? Are you sending web pages in a timely way to visitors to your site? Is your application correctly handling simultaneous requests? Do you actually know what can be measured – and which measures are relevant to your situation? Web hosting performance testing can give you valuable information that can let you keep visitors longer on your site, make sure you can accept the right number of simultaneous visitors, handle overload situations and detect possible design or programming deficiencies.
 
Latency or How Long It Takes to Get Back to a Visitor
Let’s start with the case of just one visitor (naturally, you’ll probably be aiming for rather more, but we’ll discuss this below.) Normally, you want the response time for that visitor to be as fast as possible. In other words, between the moment when the visitor clicks to send you a request and the moment the visitor sees your response, the least time possible should elapse. This ‘latency’ can however be determined by several different things, including the power of your web hosting platform, the size of your network connection and the power and network speed of your visitor’s computer. You can improve the first ...

web hosting

]]>
The post Performance Testing: Latency, Load, Stress, or Soak? appeared first on HostGator Blog | Gator Crossing.

5 heavy load

How well does your web hosting perform? Are you sending web pages in a timely way to visitors to your site? Is your application correctly handling simultaneous requests? Do you actually know what can be measured – and which measures are relevant to your situation? Web hosting performance testing can give you valuable information that can let you keep visitors longer on your site, make sure you can accept the right number of simultaneous visitors, handle overload situations and detect possible design or programming deficiencies.

 

Latency or How Long It Takes to Get Back to a Visitor

Let’s start with the case of just one visitor (naturally, you’ll probably be aiming for rather more, but we’ll discuss this below.) Normally, you want the response time for that visitor to be as fast as possible. In other words, between the moment when the visitor clicks to send you a request and the moment the visitor sees your response, the least time possible should elapse. This ‘latency’ can however be determined by several different things, including the power of your web hosting platform, the size of your network connection and the power and network speed of your visitor’s computer. You can improve the first two, but the last two are out of your control (although keeping your web pages simple may help.)

 

Performance Under Load

Ideally, you should have an idea of how many visitors are likely to access your web hosting platform at the same time. If this is not feasible, then you should at least know how many average or typical users can actively work with your site simultaneously, and plan ahead for options to increase capacity if you need to. Different solutions, either free or paying, online or in-server, are available for conducting load tests with up to a few million simulated users or more. Whichever solution you choose, make sure your test is representative of both user numbers and types of activity, including number of pages called per hour, number of requests for database information, ‘think time’ and so on.

 

When It’s All Just Too Much

If your web site is significantly more popular than you imagined, your web hosting facility may not be able to cope with all the traffic. Then what happens? Does your site send out a polite apology about lower performance while stopping any new connections, or does it just crash without warning? Stress tests are designed to find out what (really) happens under conditions of excessively high loads. How much this affects you will depend on what kind of website you operate. A web site for a bird spotting association that simply crashes may just be an irritation. A web site selling hot new fashion articles that simply crashes could lose you important revenue and customer loyalty.

 

A More Technical Test

The soak test is done by starting your web site or application and leaving it to run (normally) for an extended period of time to see whether this produces any abnormal conditions either in the application or in the web hosting platform it runs on. One example would be memory leaks, a common enough problem when an application uses some main memory, but fails to return it for general use when it’s finished with it. Testing for these kinds of conditions typically requires technical expertise, for example by the person or team designing the application in the first place.

 

Finally, Who is the Judge of ‘Good Performance’?

Performance, ultimately, is all about making sure customers or end-users are satisfied with what they experience. Your web hosting platform may be supercharged in processor power and memory, yet they may still complain. Or it may be far more modest and still reply adequately to user expectations. Falling traffic and user comments on your blog (or similar) may indicate a problem, but prevention is always better than cure. There’s only one way to find out what users really want, and that’s to ask them. Armed with this information, you can then do the right performance tests and confirm or tweak afterwards, as appropriate.

 

*****

Author Bio:
Natalie Lehrer is a senior contributor for CloudWedge. In her spare time, Natalie enjoys exploring all things cloud and is a music enthusiast. Follow Natalie’s daily posts on Google Plus, Twitter @Cloudwedge, or on Facebook.

Image source: https://www.flickr.com/photos/video4net/4102797678/in/photolist-7fxUP1-csmoYf-7C3yps-9RCj9C-ahC6R9-zhLTR-65ho4J-65hog3-65d6Gc-65d7Ex-65d7ug-65d7i6-9ME8p3-aWJPyZ-65jBWR-7C3ypb-7C3yoN-7BYKHv-7C3yoY-4Whues-9oXHMe-4So2a5-wEq41-6F8avn-xvcic-dzZjrH-4So2pQ-9kzTZu-ayfSbd-zhMYn-ahCo27-8KtMnD-5NFE6D-9ME8pd-8kQ3b-4So2Zo-4SiPLi-8p1sAC-hYuBDZ-9ME8p9-9ME8ph-deYPPh-ahzkA6-zhMYj-xvcia-enp8Um-ahC7HY-ahCnjS-ahzA8t-ahCns5

web hosting

]]>
http://blog.hostgator.com/2014/10/02/performance-testing-latency-load-stress-soak/feed/ 1
Your Business To The Power Of Google http://blog.hostgator.com/2014/09/29/business-power-google-2/ http://blog.hostgator.com/2014/09/29/business-power-google-2/#comments Mon, 29 Sep 2014 16:30:11 +0000 http://blog.hostgator.com/?p=8725 The post Your Business To The Power Of Google appeared first on HostGator Blog | Gator Crossing.

What do you do when one of the world’s most innovative companies of all time reaches out to you and your business and says, “We want to help?” Here’s a hint: take their hand and say “thank you” without any hesitation. Some things just make sense… and sometimes saying “no” makes no sense at all.
Cue, the mighty Google. What can be said about the company whose name has not only become synonymous with Internet searches but has actually become a verb; an honor reserved for only the most creative and unique individuals and entities in existence. Google has long been a standout for more than what they bring to the table; who they invite to the table with them is of equal importance. And, this time, they are inviting you.
Google Apps is a suite of tools, most of which you’re likely already familiar with (Gmail, anyone?) that are designed to streamline your business. HostGator now uses Google Apps internally for our email, document sharing, video conferencing, calendars, and so forth. Google Apps has literally changed the way we function, day to day.
Here is a brief snapshot of the things Google wants to do for you, aside ...

web hosting

]]>
The post Your Business To The Power Of Google appeared first on HostGator Blog | Gator Crossing.

Google Apps Work HostGator

What do you do when one of the world’s most innovative companies of all time reaches out to you and your business and says, “We want to help?” Here’s a hint: take their hand and say “thank you” without any hesitation. Some things just make sense… and sometimes saying “no” makes no sense at all.

Cue, the mighty Google. What can be said about the company whose name has not only become synonymous with Internet searches but has actually become a verb; an honor reserved for only the most creative and unique individuals and entities in existence. Google has long been a standout for more than what they bring to the table; who they invite to the table with them is of equal importance. And, this time, they are inviting you.

Google Apps is a suite of tools, most of which you’re likely already familiar with (Gmail, anyone?) that are designed to streamline your business. HostGator now uses Google Apps internally for our email, document sharing, video conferencing, calendars, and so forth. Google Apps has literally changed the way we function, day to day.

Here is a brief snapshot of the things Google wants to do for you, aside from provide you with an excellent suite of fully useable tools:

  • Help ensure your business is HIPPA, PCI, SOX compliant
  • Provide you with their SLA for your internal AND external mail
  • Reduce your required IT costs
  • Improve your communications with conference functions
  • Establish a secure backbone for your internal and external interfacing
  • Maximize your project management efficiency with synced calendars
  • Bolster your branding and SEO efforts
  • Facilitate editing in multiple document formats without purchase of a license

 

This is a very big deal. In short, these benefits are amazing. Whether for your independent consultancy, your medium sized growing business or if your company has recently gone public, Google Apps for your business is possibly the best and arguably the most important move you can make. The biggest benefit of all? Making your life more simple. Now HostGator can help as well. Not only are we customers of Google ourselves, but we’ve now partnered with Google to offer Google Apps for business directly to you.

To learn more about our Google Apps offerings, including full details and how to order, please see our related KnowledgeBase article: http://support.hostgator.com/articles/articles/hosting-guide/lets-get-started/google-apps.

web hosting

]]>
http://blog.hostgator.com/2014/09/29/business-power-google-2/feed/ 4
The Shell Shock Vulnerability http://blog.hostgator.com/2014/09/25/shell-shock-vulnerability/ http://blog.hostgator.com/2014/09/25/shell-shock-vulnerability/#comments Thu, 25 Sep 2014 21:58:20 +0000 http://blog.hostgator.com/?p=8701 The post The Shell Shock Vulnerability appeared first on HostGator Blog | Gator Crossing.

The bad guys are unfortunately at it again. Today the Internet lit up with news of a new vulnerability, officially named “CVE-2014-6271,” but more widely-known as “Shell Shock,” a reference to the environment exploited, known as a shell.. The shell in question is called BASH, itself an acronym for Bourne Again SHell. Nearly all Linux servers in the world have BASH installed; it is the most common shell in use today. A shell itself is what is used to interact with the operating system via command line.
Before we proceed, you should know that all HostGator servers have been patched as of this writing. We identified the issue very early-on and developed the necessary solution for our environment. We are, of course, continuing to monitor the situation and will react appropriately should the need arise.
As with any security or vulnerability risk, it is important to reiterate the importance of practicing good security to the extent of your ability as an end user. Always use secure passwords (you know the drill: upper- and lowercase letters, numbers and special characters), always keep any third-party scripts (such as WordPress, Joomla, etc.) up-to-date, and always uses the latest ...

web hosting

]]>
The post The Shell Shock Vulnerability appeared first on HostGator Blog | Gator Crossing.

The bad guys are unfortunately at it again. Today the Internet lit up with news of a new vulnerability, officially named “CVE-2014-6271,” but more widely-known as “Shell Shock,” a reference to the environment exploited, known as a shell.. The shell in question is called BASH, itself an acronym for Bourne Again SHell. Nearly all Linux servers in the world have BASH installed; it is the most common shell in use today. A shell itself is what is used to interact with the operating system via command line.

Before we proceed, you should know that all HostGator servers have been patched as of this writing. We identified the issue very early-on and developed the necessary solution for our environment. We are, of course, continuing to monitor the situation and will react appropriately should the need arise.

As with any security or vulnerability risk, it is important to reiterate the importance of practicing good security to the extent of your ability as an end user. Always use secure passwords (you know the drill: upper- and lowercase letters, numbers and special characters), always keep any third-party scripts (such as WordPress, Joomla, etc.) up-to-date, and always uses the latest version of any software that you utilize… because the truth is that often software is updated strictly for security patch purposes.

Should the need arise, we will update this blog post accordingly. Otherwise, stay safe out there on the Interwebs!

web hosting

]]>
http://blog.hostgator.com/2014/09/25/shell-shock-vulnerability/feed/ 9
Twitter Email List Targeting http://blog.hostgator.com/2014/09/24/twitter-email-list/ http://blog.hostgator.com/2014/09/24/twitter-email-list/#comments Wed, 24 Sep 2014 11:29:07 +0000 http://blog.hostgator.com/?p=8502 The post Twitter Email List Targeting appeared first on HostGator Blog | Gator Crossing.

 
For those of you who have been using social media advertising, you may know that Facebook has allowed for email list targeting for some time now. This feature is great because you can strictly target those users in your email list. Companies can even use their existing client lists to target them on Facebook for customer promotions and increasing customer value. Now, Twitter has entered the game with the option to upload lists to target with ads.
 
Why Email Targeting?
With email targeting, you can direct ads straight to those who you believe are the best for your promotion. For example, you have a list of customers who bought Product A and you’re having a sale on Product B that is a really good complementary item for Product A. Instead of emailing everyone on this list, you can run a campaign on Twitter to let them know about the sale. Or you can have an integrated campaign to email them and promote to them on Twitter.
 
Is It Just Email Targeting?
No. You can create a targeted audience with different types of lists. Email is usually what most businesses have from their clients. Not all request phone numbers. You can create lists with the following ...

web hosting

]]>
The post Twitter Email List Targeting appeared first on HostGator Blog | Gator Crossing.

Target On Twitter With Email
 
For those of you who have been using social media advertising, you may know that Facebook has allowed for email list targeting for some time now. This feature is great because you can strictly target those users in your email list. Companies can even use their existing client lists to target them on Facebook for customer promotions and increasing customer value. Now, Twitter has entered the game with the option to upload lists to target with ads.
 

Why Email Targeting?

With email targeting, you can direct ads straight to those who you believe are the best for your promotion. For example, you have a list of customers who bought Product A and you’re having a sale on Product B that is a really good complementary item for Product A. Instead of emailing everyone on this list, you can run a campaign on Twitter to let them know about the sale. Or you can have an integrated campaign to email them and promote to them on Twitter.
 

Is It Just Email Targeting?

No. You can create a targeted audience with different types of lists. Email is usually what most businesses have from their clients. Not all request phone numbers. You can create lists with the following information:

  • Email
  • Phone Numbers
  • Twitter User Names
  • Twitter User IDs
  • Mobile Advertising IDs

 

How To Create A Targeted Audience

Creating a targeted audience with Twitter is pretty simple. First you will need to have a list generated from your CRM or email software. Then you will just need to follow these steps.
 

1. Click Tools on your Twitter Ads navigation bar. Then select Audience Manager.

twitter-audience-maker

 

2. Click “Create Audience” on the upper right side of the UI.

Audience Manager on Twitter

Here is a picture of the @HostGator audience manager. These are small lists for a specific purpose.

 

Target-Twitter-Audience

3. Give your list a name, then choose the type of list you are uploading. Remember that it will need to be a .csv or .txt file.

 
 
 
 

4. Select the type of audience you’re uploading

 
 
 
 

5. Upload your file

 
 
 
 
 

Things To Consider

Read the Twitter Ads Terms of Service. You don’t want your account banned for doing something you shouldn’t be doing.
 
Update your privacy policy about customer information being used for advertising if it isn’t already in there.
 
Separate your lists. Perhaps I just like granularity, but I like to see that we have 10k emails and 5k phone numbers that converted to targeted Twitter users. It was interesting to see.
 
On that same note, use multiple lists! Sometimes the email your customer gives isn’t the one they used for Twitter but the phone number is. You don’t want to miss out on being able to target them. For our lists, cell phone numbers matched up more than home phone numbers.
 
Don’t expect to launch a campaign immediately after uploading the list. It can take several hours for Twitter to match the contents on the list with users. I tend to upload my list before I go home for the day so that I can start the campaign the next day.
 
Match rate will be lower than Facebook custom audiences. With the same list, Facebook matched 4,400 users and Twitter only matched approximately 1,100.
 
Audience matches of less than 500 will be listed as too small and you will not be able to advertise to them.
 
That’s it about Twitter email list and audience targeting. Please feel free to ask any questions or express concerns in the comments below!

web hosting

]]>
http://blog.hostgator.com/2014/09/24/twitter-email-list/feed/ 1