I am very proud to announce that on Tuesday at the 8th annual cPanel Conference, ServInt received the 2014 award for Best Migration Partner during the keynote presentation. We were praised for ensuring quality migrations for all our cPanel customers, and for our migration team’s seamless integration with cPanel’s migration experts.
This award meant a lot to us. We know that moving can be hard, and we take pride in doing it right — and we’re extremely proud to be recognized as one of the companies that does cPanel migrations to cPanel’s exacting standards.
More websites are hosted on cPanel than on any other commercially available Control Panel in the world. They are quite simply the most popular game in town, and they are ServInt’s preferred control panel. ServInt was also cPanel’s very first partner to achieve 100% cPanel certification, but we took it one step further and had every single customer-facing employee get certified, including myself. I still don’t think there’s another mainstream hosting provider that can say that.
I want to thank cPanel for distinguishing us with this award. We at ServInt appreciate your partnership as well. I believe we make migration easier than any other host in the industry, whether users are migrating from a cPanel based account or any other control panel.
In the context of hosting, “Cloud” originally referred to a “next generation” of technology abstraction, something better than basic virtualization. Vendors proposed many conflicting definitions that included a mix of vertical scaling, horizontal scaling, automatic scaling, API driven provisioning, etc. Usually, whatever a particular vendor was offering was that vendor’s definition of Cloud.
There was never full agreement on what constituted Cloud, and then, over time various traditional, non-Cloud hosting platforms began growing Cloud features. So, did those platforms become Cloud platforms, and if so, when? That’s a question that’s open for debate. Read more
Last week I wrote about how ServInt was beating the NSA. Here’s a talk I gave on the same subject in TechWeek in Chicago last month. ServInt cares about protecting our users’ rights. The talk will explain why we care, and what we’re trying to do to fix the “NSA problem.”
Yesterday I was interviewed by Bloomberg News about the effects of NSA surveillance on the Cloud. They wanted to know if we had lost any customers specifically because of the Edward Snowden leaks. This, of course, is a hot topic: how is mass surveillance affecting the cloud, and can we quantify the damage that is being done? Is it costing us jobs and economic growth in the cloud? The answer, of course, is “yes” — and ServInt isn’t scared of saying so.
I said that we had lost customers and even more potential customers — which is true. ServInt has been one of the few players willing to speak up and say this and as a result we have been quoted in places like The Hill and the New York Times. The cloud hosting field is a tough, competitive business and it is hard to talk about losses. But ServInt isn’t afraid of calling out the problem, because we have been leaders in directly addressing the issue since it arose a little over a year ago.
The cloud in the United States has been badly hurt by the actions of the NSA. These days anybody can relocate their digital business with just two or three clicks of a mouse. You don’t need to sign a long contract or tell anybody why you are making your choice, you just move. I’ve talked to a lot of people who have decided they want to move their business outside of the United States because they feel like the US doesn’t care about privacy. I’m quoted in the Bloomberg article about this being a “death by a thousand papercuts.” I was talking about the affect on the overall economy, not our business, which for the record has seen a 30 percent decline in foreign signups since the NSA leaks began, not a 30 percent decline in total foreign customers.
In fact, ServInt is actually weathering the Snowden storm very well, compared to many of our competitors. Why? Because our clients trust us. They understand the cardinal rule of security and data safety:
It’s not where you’re hosted, it’s how you’re hosted.
Your business needs to stay up, online and fast. It needs to stay stable and secure. And your data needs to be protected. You need experts at the helm to accomplish all of those things — experts you trust. And earning the trust of small to medium businesses is what ServInt has been doing for 19 years.
The NSA revelations are just another hurdle to overcome in ServInt’s ongoing pursuit of being the most trusted name in the Cloud. We’re doing so by requiring warrants for content, and by responsible handling of data. We’re doing so by being thought leaders in the fight against NSA surveillance in Washington, through our leadership within the i2Coalition. And we’re trying to curb the misinformation about NSA surveillance. Everybody tempted to move their content out of US datacenters needs to remember that the vast majority of all spying is done on foreign networks. “Move your site out of the U.S. to avoid spying” may be good marketing, but it doesn’t take into account the reality of how surveillance works.
We do all this because we want to win the day, and win it honorably, by doing the right thing We win the day when we make customer trust our number one goal. We win the day when our customers know we have their backs when it comes to protecting their data, and we win the day when we fight for privacy and NSA accountability.
Last week, a good friend who works at Google sent me a link to a Wall Street Journal story on the price wars that seem to be heating up in the cloud computing and storage sectors. (Editor’s note: WSJ hyperlinks only work once. To read this article run a google search for “A Price War Erupts in Cloud Services”)
I found the article fascinating, but I thought it did a surprisingly poor job helping the reader understand how the Cloud might affect real-world hosting decisions.
At the center of the problem was the effort the author made to demystify the cost of cloud hosting. In order to provide a common storage and processing task against which all the major cloud service providers’ fees would be measured, the author chose the following:
“(Hosting) a medium-sized website with about 50 million page views a month…” Read more
Earlier today, ServInt signed on to a letter, spearheaded by the Center for Democracy & Technology, that was sent to leaders in the U.S. House and Senate. The letter urged reform of U.S. surveillance practices “by limiting the scope of surveillance and by substantially enhancing…privacy protections, oversight, and accountability mechanisms” — specifically through the enactment of the USA FREEDOM Act, about which we’ve written here before.
Following is a transcript of the letter. Please take a moment to look it over — then contact your elected representatives to urge them to support it. If you’re looking for the Reader’s Digest version of what’s at stake here, it boils down to this: the USA FREEDOM Act would close a wide range of loopholes in previous homeland security-related legislation that make it easy for the government to gain access to your e-mail, data, and other private information, without warrants or the protection of other elements of basic due process. Here’s the letter: Read more
For this final post on the history of U.S. Internet regulation, we need to look at one of the broadest pieces of cybersecurity policy out there – broad enough to hit just about anybody in the world. The Computer Fraud and Abuse Act (CFAA) of 1984 and its increasingly liberal interpretation have led to a state of affairs in which most U.S Internet users — you and me included — could be considered felons.
Technology is changing far faster than any government could hope to keep up. One of the many challenges of setting cybersecurity policy is that if you set requirements that are technical in nature into the law they will be outdated by the time they are passed. The law can’t be prescriptive when it comes to cybersecurity, so it ends up turning to broad generalization.
The Computer Fraud and Abuse Act is one of those laws that succumbs to broad generalization. Read more
Any discussion about PRISM centers around the concept of privacy on the Internet. For my third post on the history of U.S. Internet Legislation, I’ll focus in on the laws that govern our privacy online.
When attempting to ascertain the state of online privacy, there tends to be a lot of talk about law enforcement “abuses.” Having a basic understanding of the laws that serve as the basis for most law enforcement and Intelligence community programs that target online activity can help us determine how, and whether, things need to change.
Let’s start our brief look at those laws by imagining that I’m a U.S. Federal officer and you are an American citizen, and my goal is to go through your underwear drawer to look for suspicious activity. To do that I need a search warrant, signed off by a judge, and generally to get that I need probable cause. The Fourth Amendment to the United States constitution, which prevents unreasonable search and seizure, requires that. The Electronic Communications Privacy Act was written to codify that these fourth amendment rights also exist online. However, certain laws carve out exceptions to the warrant requirement under specific conditions.
Discussion of our privacy rights online center around what the government has and doesn’t have the right to do with our online data. In the wake of PRISM I want to define two categories through which we can explore those legal rights:
- Surveillance that is made possible by the acquisition of a search warrant by law enforcement
- Surveillance that is made possible through an exception to the warrant requirement
Below are a few common legislative acts (not an exhaustive list) that empower law enforcement to get data they seek online. Read more
With the U.S. government’s PRISM program, there has been a lot of talk recently about what the government can and will do with Internet communications. What the government can do is limited by the protections granted under various laws governing the Internet. Some of the most important laws governing protections on the Internet are nearly 20 years old and – when written – were ancillary to much broader legislation.
In 1996, when the Internet was full of promise but of questionable scope, two pieces of United States legislation were passed that helped form the basis of the commercial Internet:
Section 230 of the Communications Decency Act (CDA 230)
The Safe Harbor provisions of the Digital Millennium Copyright Act (DMCA Safe Harbor).
As the Chief Operating Officer of a web hosting company, I take a lot of pride in the work we do. Companies like ServInt are building tools for people who are using the power of the Internet to change the world. Without the protections we receive from laws like CDA 230 and DMCA Safe Harbor, this innovation would not be possible. These two laws are the pillars that hold up the U.S. commercial Internet. Read more
Any discussion of U.S. government laws relating to the Internet and programs like PRISM inevitably begin all the way back in 1986 with the passage of the Electronic Communications Privacy Act. Written before the birth of the modern Internet, ECPA is a key law that enables law enforcement to have access to data while protecting the privacy rights of citizens. ECPA is not a scary law that steals people’s Internet freedom. ECPA is simply an outdated attempt to preserve freedom in the digital arena.
What it is:
At its heart, ECPA is an attempt to try to define the scope of the Fourth Amendment (the part of the Bill of Rights which guards against unreasonable search and seizure, along with requiring any warrant to be judicially sanctioned and supported by probable cause) when it comes to digital communication. Over time, both legislation and judicial precedent have told us what is and isn’t unreasonable search and seizure when it comes to law enforcement action at our home, place of business or on a public street, but in 1986, when Congress took up the task of creating ECPA, they were attempting to outline rules for search and seizure of remotely stored digital data.
ECPA outlines the relationship between data storage providers, their customers, and law enforcement. It acknowledges that providers act as custodians and not owners of information in their possession on behalf of their customers and subscribers. It actually serves to limit the ability of providers to voluntarily disclose customer information to the government.