Latency will be the big issue. And how it affects your program depends on the program.
Does the program need 1 call, 20 calls, 100 calls with heavy DB inserts?
If this is the lifeblood of the system, then it should be located as close to the majority of users as possible. The Bill for the hosting services can be passed onto the customer anyway. The customer may gripe at a slightly larger hosting bill, but they will gripe more if it takes 10 times as long to complete any work process due to high latency issues.
I'm building a web application for a small office, to run their daily business. The employees will be logged in and working in the system thorugh the whole day.
My client is located in Israel, and I'm shopping for a hosting cloud provider for him to host the application that I'll build
My options is a server in the US, in Europe, and a local one - in Israel. A local provider is far more expensive.
I need to estimsate how much will the location of the server influence the reponsiveness of the system. And need to do it before I actually order the hosting, install the application and can measure it directly.
Is it a problem at all? Is the latency for a server located over the Atlantic generally felt by users and uncomfortable? How about from one side of Europe to another? (3000 Kilometers by air, from Germany to Israel)
Are there common numbers (like: average ping time between these two countries, or geographical regions, is such and such)
The Distributed Denial of Service (DDoS) attack is becoming the crowbar of the online criminal. In the past we have got rather used to DDoS attacks being one of the favoured approaches of hacktivists, with perhaps the Low Orbit Ion Cannon (LOIC) and later the High Orbit Ion Cannon (HOIC) as used by Anonymous to take down sites being the best known examples. However, recent evidence suggests that taking down a site is increasingly no longer the be all and end all of a DDoS attack, instead it's just a means to a much more profitable end.
A couple of weeks ago I reported how a Bitcoin bank robbery took place under the smokescreen of a DDoS attack. I've now learned that a DDoS attack on another Bitcoin-related site, the Bitcointalk.org online forum, could also have been implemented as a smokescreen tactic. Information Week reports the site was actually targeted for a password-stealing exercise with some 176,584 users login credentials at risk.
Indeed, as TK Keanini (CTO at Lancope) points out there is an established marketplace out there selling the DDoS capability to anyone with the cash, and relatively little of it is needed to attack a smaller company, so the bad guys don't even need a DDoS strike capability as a core competency any more. "It is almost always the case these days that DDoS attacks leverage blended methods, where the volumetric technique is included, but not the primary objective" Keanini says, adding "this is a sign of what is to come in 2014 as more adversaries just put together a multi faceted compostable attack and instead of having to have all this expertise in-house, they will be able to outsource via these marketplaces that sell these capabilities."
Jag Bains, CTO at DDoS mitigation experts DOSarrest says that his company has been seeing DDoS attacks sending huge amounts of traffic to a website to overwhelm key points in its infrastructure to send the security team scrambling to fight it off as something of a trend. "This serves as a distraction for the security personnel and aims to weaken the underlying infrastructure" Bains explains "once the security operations are no longer cohesive, criminals can use other methods to target intrusion prevention systems to get in and steal information". All of which just goes to reinforce that maintaining the focus of core operations during a DDoS attack is an ever increasing problem for IT operations. "As DDoS continues to be used as part of a 1-2 punch in cybercrime and data theft attempts" Bains concludes "IT professionals have become stressed in keeping up with the ever increasing size and sophistication of DDoS attacks". All of which can influence an organisation to resort to what you might call non-standard, or panicked, practices to deal with the ongoing attack. Things such as disabling their IDS platform for example. Things that further compromise the overall security of the network and enable the attackers to pull off the primary attack with ease.
it has not messed up in a while. i think i might know what was ging wrong. i have a wireless router, and an extender, i am pluged into the extender with a ethernet cord, and the internet was going in an out, it has not gone out for a while now. so i think that was the problem. ty for your help. very nice people here..
i am not really sure what happens, nor how long it works. usally when i wake up in the morning.. it aint working anymore.. before i go to sleep it is fine.. but when i wake up it has the yellow triangle.. and after the restart, only thing that is changed is that starts working again.. i am not sure what is going on.
The card may be broken. You can remove the entry for the card from your hardware management page and then restart the computer (a full shuntdown and then power it back on). When the operating system starts it will scan for new hardware and reinstall the driver for the card. If it is still showing this problem after you do that, then the card itself is probably at fault.