Written by December 29, 2015

Time flies when you’re having fun, and 2015 went by in a hurry for everyone here at HostDime.

Written by December 15, 2015

Yesterday afternoon, Joomla released Version 3.4.6 to address 4 security vulnerabilities. It is highly recommended that users should immediately upgrade to version 3.4.6.

Written by December 9, 2015

We pride ourselves on answering support tickets at breakneck speed, but we can be even faster with your help. In order to receive the quickest support, it is helpful for us to have as much information as possible.

Written by December 3, 2015

“Extremely large attacks grab the headlines, but it is the increasing size of the average DDoS attack that is causing headaches for enterprises.”

Written by November 25, 2015

HostDime’s DevOps team will be conducting open interviews at our Research Park office, from 10AM to 5PM on Thursday, December 3, and Friday, December 4.

Written by November 20, 2015

Opening in 2021, HostDime’s upcoming seven story data center and corporate office in Orlando, Florida will be the enterprise’s new headquarters.

Written by November 16, 2015

David Vivar, HostDime’s VP of Engineering, USA & Global, speaks on the “Local Infrastructure is Local Development” panel at the 2015 Internet Governance Forum.

Written by November 5, 2015

Starting today, HostDime’s dedicated server line gets even better with a line fully comprised of new v3 Haswell-based Xeon CPUs, including the Dodeca (12!!!) core CPUs.

Written by October 28, 2015

HostDime was on hand for this weekend’s “Smash the Record” tournament, which holds the Guinness World Record for “Longest Video Game Marathon Playing a Fighting Game”.

Written by October 26, 2015

An in-depth look at the process of enabling and configuring backups on a dedicated server.

Written by October 7, 2015

Orlando’s booming tech community is ready to take on the next wave of digital advancements, and there is no greater evidence than the last five days at OrlandoiX.

Written by October 2, 2015

Jetpack is one of Wordpress’ most popular plugins; the exploit affects the contact form module present in the plugin, which is activated by default.