About Liquid Web

A Leader In Managed Hosting since 1997

Our Heroic Support technicians are located on-site at each of our data centers.
Liquid Web Official Blog

Liquid Web Easter Egg Hunt
Filed under: Contests  April 18, 2014

Win a Liquid Web Cooler!

Who doesn’t love hunting for Easter eggs? Take a stroll through our Google Street View Tour (below) to find our four Easter eggs hidden behind QR Codes. Each Easter egg contains a one-word clue. Once you find all four clues, finish the sentence below for a chance to win a Liquid Web Cooler just in time for spring picnics!

Every participant will win enough Liquid Web Shop points for Liquid Web travel mug, perfect for brisk Spring mornings, as well as being entered in a drawing to win one of five embroidered Liquid Web coolers! Happy Hunting!

How To Play:

  • Take the Liquid Web DC3 Google Street View tour (below) and find our “easter eggs” hidden behind four QR Codes.
  • When you find all four easter eggs, string together the clues and finish the following sentence:

  • Liquid Web: web hosting with a …

  • Finish the above sentence and share it on one of the following social media platforms, tagging Liquid Web and including the hashtag #LiquidWebEaster.
    1. Facebook – Share the full sentence, tag @Liquid Web Inc and include #LiquidWebEaster in the description. Make sure privacy settings for your post are set to “public”!
    2. Twitter – Tweet the full sentence, tag @Liquid Web, and include #LiquidWebEaster in the description.
    3. Google+ – Share the full sentence, tag +Liquid Web Inc, and include #LiquidWebEaster in the description.
  • Don’t forget to include your Liquid Web Shop username, so you can collect your prize! If you do not have a username but wish to participate, please register at Liquidweb.com/Shop.

View Larger Map


  • To enter, simply finish and share the above sentence using our four clues on your own Facebook, Twitter, or Google+ accounts. Make sure to include:
    1. A finished version of the above sentence, based on our four clues.
    2. Tag Liquid Web
    3. #LiquidWebEaster
    4. Your own Liquid Web Shop username
  • Entries posted must tag ‘Liquid Web, Inc’ on Facebook, @liquidweb on Twitter, or +Liquid Web Inc on Google+.
  • Entries must include Liquid Web Shop username to be eligible to count as a completed item. If you do not have a username but wish to participate, please register at Liquidweb.com/Shop.
  • Submissions must also include the #LiquidWebEaster hashtag.
  • All participants will win enough points for a Liquid Web Travel Mug.
  • All participants will be entered in a drawing, to take place Monday, April 21st 2014, for the chance a Liquid Web cooler. Five winners will be chosen.
  • Winners will be notified of their winning submission via reply on Facebook, Twitter, or Google+ from Liquid Web.
  • The contest will begin at 1pm (Eastern) on April 18th and last until 8am (Eastern) April 21st, 2014.
  • Liquid Web employees and Employee family members are ineligible to win.

Understanding the Jargon, Part Two
Filed under: Industry Insights,News  April 14, 2014

We have previously devoted space on this blog to educating our readers and helping them understand the jargon used in the web hosting industry. To continue on with this practice, we present you with a Part Two to our “Understanding the Jargon” post from last summer. In this post we will focus on commonly used acronyms within our industry.


API stands for “application programming interface” and specifies how software components should interact with each other. For example, our Storm API enables software developers to develop applications for automatic server deployment, configuring a load balancer, etc.


DNS, or Domain Name System, is a method for naming servers, network services and other network connected devices. When we enter a website name into a browser window, the DNS translates those that website name to an IP address automatically.


The File Transfer Protocol is a network protocol used for exchanging files over the Internet. It is most often used to upload or download a file to or from a server.


HyperText Transfer Protocol is the underlying protocol that defines how messages are formatted and transmitted online, and what actions web servers and browsers should take in response to various commands. It is commonly used to transfer web pages from a server to a user’s web browser.


Hypertext Markup Language is the main markup language for creating web pages and it defines the structure and layout of a web document. It uses a standardized system for tagging text files to achieve font, color, graphic, and hyperlink effects on web pages.

IP Address:

An IP (Internet Protocol) address is a numerical label assigned to each device (computer, printer, etc) that is participating in a computer network.


RAID, or a “redundant array of independent disks,” is a way of storing the same data in different places (thus, redundantly) on multiple hard disks in order to provide fault tolerance, improve performance, and increase storage capacity.


A solid-state drive, or solid-state disk, is a high-performance storage device that stores persistent data on solid-state flash memory. In contrast to a typical hard drive, the SSD contains no moving parts.


Secure Shell, sometimes known as Secure Socket Shell, is a program that allows one to securely: access a remote server, execute commands on that server, and move files to and from that server.


A Universal Serial Bus is an industry standard that was designed to standardize the connection of computer peripherals (like keyboards, pointing devices, cameras, printers, etc) to personal computers for communication and power supply purposes.


A VPN, or virtual private network, uses encryption to secure your computer’s connection to the Internet and guarantees that all of the data you’re sending and receiving over the VPN is secured from any potential prying third parties.

There are so many technical terms used every day in our industry, that simple explanations be can be confusing for the uninitiated. Hopefully we have helped you find some clarity amidst a sea of unfamiliar acronyms. We believe in complete transparency when it comes to working with our customers and would be happy to explain any of the terms, acronyms or phrases that we use. Our Heroic Support® is, of course, available to help 24/7/365.

Do you have any other acronyms or terms you struggle to understand? Let us know!”

Your Bracket May Be Busted But The Technology Behind It Is Flourishing
Filed under: Industry Insights,News  April 4, 2014

Is Your Bracket Busted?
With the the exciting conclusion of March Madness on the horizon as NCAA basketball’s semi-finalists set to square off for supremacy this weekend, chances are your interest in the tournament has waned commensurate to the failure of some of your predictions. Don’t feel bad. With the odds of picking a perfect bracket stacked at an eye-poppingly insurmountable 1 in 9.2 quintillion, you’re not alone. To make matters worse, those odds have only been rising with the addition of factors such as play-in games and increased parity driving a record number of upsets. However, even as the odds of winning get worse, the participation in competitions to choose a perfect (or closest to perfect) NCAA Basketball Tournament bracket has grown exponentially in the past 30 years.

Barriers to Entry

Advancements in television, cable, marketing, and even shifting cultural trends, are all factors often cited for the increased March Madness bracket tournament participation. Even when taking these variables into consideration, the force of the growing Internet and advancements in web hosting technology cannot be ignored as primary influences for the uptick.

Think of the effort that individuals put into launching, running and competing in March Madness bracket challenges as recently as the early 90’s. For instance, if you had a strong inkling in 1992 that Chris Webber’s Fab Five Michigan Wolverine Freshman were going to make a run at Christian Laettner’s mighty Duke Blue Devils and wanted to put your money where your mouth is (so to speak), you would have had to find (or arrange) a group that wanted to participate in a bracket competition, find a physical bracket (or manually draw and populate one) to fill in with your picks, and then calculate responses against a number of submissions, all containing at least 64 different win/loss variables. This was a painstaking process that not only limited the playing field to die-hard college basketball fans, but also precluded NCAA Tournament prognostication from becoming the big business and news story that it has become in this millenium.

Innovation Leads to Proliferation

With a number in excess of 60 million Americans participating in 2014, some estimate that March Madness pool activity has grown 2,000% since the field of teams admitted to the Tournament expanded to 64 in 1985. While this increase has been somewhat gradual, it’s sharpest upward growth came in the late 90’s and early 2000’s when many entities promoting the NCAA Tournament, such as CBS and ESPN, began offering platforms to not only fill in and store the variable selections in your bracket on their websites, but also to pit those selections against people filling out brackets around the world. This newfound ease of use served as the proverbial game-changer that spread this cultural phenomenon from barstools to office cubicles and led the sideways glances you might have got when mentioning your March Madness “pool” or “bracket” in many settings, to comparing said bracket with one your Mom may have filled out.

Development Drives the Trend

While general growth of the Internet and the hyperconnectivity it’s ceded has led to many casual observers participating in March Madness pools, these new online platforms have helped hurdle many barriers to widespread adoption, such as cutting the time individuals had to earmark for participation to a fraction of that spent in the above example from 1992. Therefore, the hero to credit much of today’s Bracketmania is the parallel advancement of database and web hosting technology.

Many of the early 80’s object databases could be populated with tournament matchups, however storing the results of many participants and comparing them based on a set of variables required advancement in communication, computing, and storage that wouldn’t be proliferated for years. From the starting point object databases provided, the development of relational databases and database management systems led to the adoption of SQL databases; the most popular tool for processing March Madness bracket results today.

Technology Propels Cult Game into American Tradition

The eventual growth of the Internet and the need to develop powerful servers to process the information it generates and transfers, led to the March Madness hysteria we witness today. Popular bracket pool outlets dedicate Highly Available server clusters to the SQL databases storing participant results. This data is then processed by a High Performance hosting architecture made up of dedicated servers, load balancers, and switches with resources dedicated toward processing results. With the current popularity of March Madness, this requires thousands of servers to handle the increasing load on many participants go-to outlets.

The resulting technology has made forming your own March Madness pool as easy as creating a profile and setting a password on any site providing the service. Any individual doing that much can then spread this information to potential participants who follow up by doing the same, setting their picks and then letting databases and the computer power of the servers they’re hosted on do the rest of the work. With the relative simplicity of this task compared to the effort it took to participate prior to the involvement of databases and servers, it’s very easy to see how technology has propelled March Madness pools into their current status as an American tradition.

April Fools’ Day Prank Roundup
Filed under: Liquid Web Culture  April 1, 2014

Happy April Fools’ Day! We hope you’re celebrating with an epic, albeit harmless, prank on your coworkers, friends or family. We’re rather proud of the pranks our teams have pulled on each other in the past, from foiling an office to making an office disappear! To commemorate this wonderful holiday, we’ve gathered our favorite pranks for your enjoyment.

In this prank, our COO Chris Strandt had some fun with our Facilities team before leaving for vacation. Little did he know the chain of events this simple “Foiled” prank would unfold!

In retaliation for a foiled office, the Facilities team planned something a little more extreme. They went above and beyond planning this prank – and successfully shocked our COO speechless. This prank was so popular with our fans that it was even featured on MTV’s Pranked!

Leaving your office unattended while on vacation is a dangerous decision at Liquid Web – especially if you’ve tried to prank our Facilities team in the past. Our COO Chris Strandt may just never live that “Foiled” prank down. This prank was detailed to be sure – right down to changing his ringtone to “It’s Raining Men” by The Weather Girls. Suffice it to say he’ll be walking into his office more cautiously from now on!

These are just a few of our favorite pranks and hijinks from around the office. With a crazy, but hard-working, team like ours you never know what might happen. If this sounds like an ideal work environment to you, check out our careers page. We’re hiring and looking for more great employees who might fit in with our fun-loving atmosphere!

Did you pull an epic office prank today? Let us know how it went in the comments below!

Featured Client: Next Place, Real Estate Search Engine
Filed under: Customer Features  March 26, 2014

Next Place Featured Client
The house-hunting process can be an exhausting one, especially if you’re using more than one of the numerous search engines that are available. Next Place is looking to improve that experience, at least for those in the Australian real estate market. A real estate search engine, Next Place has separated itself from the competition by providing all of the available Australian and New Zealand properties into one easy-to-use site. Their success has garnered attention, particularly from the likes of their new investors John Corrie of Morgans Stockbroking and Michael Millner, Deputy Chairman of the publicly listed Brickworks Limited (ASX:BKW). Those investments, in addition to the backing of Liquid Web’s Incubator Program, has Next Place looking forward to developing even more rapidly.

The recent investments in NextPlace.com.au are a testament to the growth they have seen in the Australian real estate market, where they have become a disruptive force among their competitors. Next Place stands out in the market with their unique website offering two main search features.

  • Draw Your Search – allowing users to draw out a specific area in which they would like to find a property.
  • Simple Language Search – allowing users to use “plain english” phrases, numeric values and the minus symbol to exclude features.

Read our Next Place Case StudyOur Incubator Program has provided Next Place with many advantages including free hosting, infrastructure, access to our 24/7/365 Heroic Support and Proactive Monitoring, cross promotional opportunities, software and database services, high availability, managed engineering, and scalability planning. Through the program, our technicians worked with the Next Place team to build their hosting environment on the Liquid Web Storm Platform, which allows them to easily maintain their fast and comprehensive real estate service. Read our Next Place Case Study to learn more about the details behind their hosting environment. Our Storm Platform provides them with the ability to instantly create and destroy instances, providing them with a neverending stream of new deployments crawling 400% more agent websites than they were previously able to reach. This, in addition to the excellent support and hosting advice Next Place has received from Liquid Web, has made the Incubator Program extremely valuable to Director Dan Tarasenko.

“It seems that these engineers can see around corners and quite often advise me on — or implement solutions to — my problems before they even appear,” Tarasenko said.

We’re excited to be working with Next Place as they continue to grow and take the Australian real estate market by storm. Our Incubator Program was built to provide a head start for ventures with a great vision that may be lacking the resources to implement the hosting requirements they need for execution. If you’d like to learn more about the program, feel free to contact our team via LiveChat or call us at 1.800.580.4985.

New Affiliate Program – Joining Forces with CJ Affiliate by Conversant
Filed under: News  March 21, 2014

CJ Affiliate by ConversantLiquid Web’s current Affiliate Program is undergoing some exciting changes. We are expanding the Liquid Web Affiliate Program by joining forces with CJ Affiliate by Conversant (formerly Commission Junction), one of the top affiliate networks in the industry. Becoming a part of this highly-respected affiliate network allows us to provide our affiliate partners with more benefits than ever before.

Melanie, The Liquid Web Affiliate ManagerOur Affiliate Manager, Melanie Purkis, explained how our affiliate partners will prosper in the new program.

“Our new Affiliate Program gives our partners a very robust interface to track all facets of their activity online and allows them to consolidate all of their advertisers under one account,” Purkis said. “This makes it a great tool for an affiliate who has multiple industries they sell for and makes managing their revenue a lot more convenient.”

Working with CJ Affiliate was a natural choice for Liquid Web, especially since many of our current affiliate partners already use the network for other affiliate programs. In addition, the CJ Affiliate interface provides a number of new advantages to our affiliate partners. Not to worry, the new program will still offer many of the same convenient features as our current In-House Program.

Benefits of Liquid Web’s New Affiliate Program:

  • Track impressions, clicks, leads and sales
  • Review earnings per click and conversion rates
  • Consolidate multiple advertisers under one account
  • Easy access to Liquid Web’s banners and other media
  • Automatic payments
  • Free & easy account sign up

Despite all the changes happening with our new program, our current In-House Affiliate Program will remain unchanged to accommodate our partners who wish to continue using the legacy program. The In-House program will still offer the same commissions for dedicated, shared and Storm hosting referrals, as well as hosting credit as an alternative to monetary commission. The In-House program will also continue to allow for word-of-mouth referrals in addition to the traditional referrals through links and banner clicks.

We have built a reputation upon providing the most lucrative affiliate program in the web hosting industry with our dedication to fair compensation for all of our partners, large or small. We are confident that expanding our program to include the CJ Affiliate network will only further improve our program’s reputation and we look forward to working with many new affiliate partners as they join.

If you’d like to learn more about our new Affiliate Program, feel free to contact our Affiliate Manager, Melanie Purkis, at 1.800.580.4985, ext 2481.

Firewalls In 60 Seconds
Filed under: In 60 Seconds,Products  March 18, 2014

Are your servers safe from malicious traffic? Firewalls can help prevent unsafe traffic from ever reaching your server and are crucial for protecting your hosting environment. In this edition of “60 Seconds with Liquid Web,” J. Mays explains how this technology will keep your servers safe.

Video Transcription:

A firewall, is a security device; it filters traffic, has a customizable set of rules, and protects your data.

Potentially malicious behavior, coming in like wrecking ball toward your servers, is stopped by your firewall.

At Liquid Web, we deploy two types of firewalls, both of which have that same essential function: preventing evil-doers access.

With dedicated servers, we use a physical Cisco firewall. That means you can consolidate security for your entire hosting environment into a managed device

For Storm Cloud Servers, we use a cloud-enabled firewall. Each of these firewalls are individually manageable.

In either case, firewalls are necessary for securing your hosting environment against unauthorized third-party access.

Shut the Door on Evil-Doers
Prevent Unauthorized Access
and Stop (Those) Wrecking Balls of Malicious Traffic

For more information visit our firewall page at liquidweb.com/firewall. My name is J., thanks for watching, and that’s firewalls in 60 seconds.
If you have any ideas for our “60 Seconds with Liquid Web” series, let us know in the comments below!

SAN In 60 Seconds
Filed under: In 60 Seconds,Products  March 12, 2014

Where are you saving your business’ important documents? A Storage Area Network, or SAN, centralizes your storage and provides you with unfettered access to your data, all without slowing down your web server. Allowing for easy growth and extra security, a SAN is the smart way to store your data. In this edition of “60 Seconds with Liquid Web”, J. Mays explains how this technology can simplify and streamline your storage habits.

Video Transcription:

A Storage Area Network, or SAN, is a robust dedicated network specifically for data storage.

For example, let’s say you have a popular photography studio for… say… dogs;

As you take more photos you save them across many hard drives, or maybe many web servers, but those are all quickly running out of physical space for additional drives.

The question is, where do you store that growing number of photos? That’s where a storage area network comes in.

With a SAN you can collect all of your photos together and place them in a centralized pool of redundant storage nodes. Those storage nodes are physically separate from your web server. Then, not only would you be able to access your photos from one web server, but multiple web servers as well!

As the popularity of your “photography studio for dogs” grows, scaling up storage space is easy and immediate!

Centralized Storage
Easy Scalability
Much Doge… er… dogs.

For more information visit our SAN page at liquidweb.com/san. My name is J., thanks for watching, and that’s SAN in 60 seconds.
If you have any ideas for our “60 Seconds with Liquid Web” series, let us know in the comments below!

Digital Currencies in the Datacenter: Altcoins Explained

Note: This is the second in a two-part digital currency series. See our first post for a detailed explanation on Bitcoin and how it is being mined in Data centers around the globe.
Bitcoin and Altcoins in the Datacenter
In our first post of this series we discussed Bitcoin, the original digital currency to be introduced to the market. As Bitcoin has grown in popularity very quickly, the market has expanded to include many alternative options, such as Litecoin, Dogecoin, and Namecoin. Some of these alternative options, called altcoins, are very similar to Bitcoin and utilize the same system of verifying and securing transactions through the block chain and mining process, but differ in a few important ways. If you need a refresher on how the mining process works, see the video in our first post for an explanation! In this post we’ll be taking a more in-depth look at the many altcoins on the market today and how you might take advantage of what they offer in the datacenter environment.

Creating Altcoins

Most altcoins were created based on the original Bitcoin network. Because Bitcoin was released as open source software, anyone can take the code and modify it to create their own, similar network. After Bitcoin was introduced, many users noticed what they saw as flaws in the system. Thus, altcoins were created. However Bitcoin is a distributed network and any changes to the code would require a unanimous consensus from all users – something that is very difficult to obtain. Modifying the Bitcoin source code and creating a separate digital currency was much easier than attempting to change Bitcoin itself.

SHA-256 vs. Scrypt

If you recall from our previous post, Bitcoin uses the SHA-256 proof-of-work algorithm to mine coins. Many altcoins use a different proof-of-work algorithm – the scrypt algorithm. While there are a few other reasons the scrypt algorithm has grown in popularity, the main difference between the two algorithms comes down to the hardware they need in order to quickly and efficiently mine coins. In our first post we mentioned Bitcoin miners need to invest upwards of tens of thousands of dollars for specialized processing units in order to be competitive with other miners. Because of the specialized hardware requirements, Bitcoin miners interested in relying on a Data center’s uptime and network guarantees to host their mining operations are left with limited options. Colocation is the best option for Bitcoin miners in the Data center.

Luckily for miners without the necessary funds for the specialized hardware, or miners who are interested in utilizing more Data center hardware for their operation, the scrypt-based coins are a perfect option. These coins use a scrypt proof-of-work algorithm that does not rely as much on the processing unit of the server as the SHA-256 based coins. Instead, scrypt-based coins rely quite heavily on the memory in the server. While it was quite easy for miners to scale up the processing units for SHA-256 coins, it was more difficult and expensive to scale up the memory for scypt-based coins – although it is still possible.

Altcoins in the Data Center

Because of the processing unit scaling limitations, many scrypt-based coins are still affordable for beginning miners to invest in. Not to mention, the hardware required for scrypt-based coins is easily found within most Data center environments. However, it is important to note that in most cases the younger the digital currency is, the easier it is to mine. Typically, the longer the currency, even a scrypt-based coin, is on the market, the more difficult it becomes to mine because of scaled-up hardware and other factors. Despite this general rule of thumb, the scrypt algorithm has made it much easier for more miners to begin mining altcoins without a huge investment in capital. Today many scrypt-based coins can still be mined with basic GPUs and there are even a few that can still be competitive with basic CPUs.

With less stringent hardware requirements, many scrypt-based coins can easily be mined in a Data center environment, allowing miners to rely on a host’s uptime and network guarantees while also utilizing their available hardware. If you’re interested in mining altcoins in a Data center environment, you can start by checking out our step by step instructions for installing a Dogecoin wallet on CentOS in our Knowledge Base!

If you’re looking to experiment with this new currency, or are ready to expand and stabilize your current operation, we’d be happy to help. – just LiveChat or call our team at 1-800-580-4985.

Digital Currencies in the Data Center: Bitcoin Explained
Filed under: Industry Insights,New Technology,News  March 10, 2014

Note: This is the first of two posts in our Digital Currencies in the Data Center series. In this installation, we’ll take a look at what Bitcoin is and how it can thrive in the data center. Check out our second post, which will focus on Bitcoin alternatives.
Bitcoin Logo
It’s hard to avoid all the news and speculation regarding digital currencies and what they might mean for our economy. It seems that despite the media craze currently surrounding Bitcoin, the trend of online currencies is here for the long haul and will just keep growing. In addition to Bitcoin, there are now many alternative digital coins that are gaining in popularity, which we’ll discuss in detail in a future post. Many companies are also now setting up large Bitcoin operations in data centers around the globe. We want to help all of our customers understand these potential currencies of the future and help them capitalize on them in the most efficient way. In this post, we’ll look at the hardware behind Bitcoin mining and how bitcoins are mined in data centers around the world.

For those who may not be well-versed in the technical details behind Bitcoin, here’s a quick video to catch you up:

Mining Hardware: CPU, GPU & Beyond

The mining process mentioned in the video above differs depending on the type of coins you’re mining. With Bitcoin, this mining process depends on an algorithm called SHA-256, which relies heavily on the processing unit in the server. Originally all one needed to successfully mine bitcoins was a computer with a basic CPU, or central processing unit. The barriers to entry for Bitcoin were very low at this point, since nearly everyone who had the desire to mine bitcoins could easily be successful and competitive. However, miners were soon advancing past the mining capabilities of a CPU, and began tailoring software in order to utilize the more powerful GPU, or graphics processing unit (otherwise known as a Graphics Card). GPUs are much faster and more efficient at mining bitcoins than their CPU counterpart, because they can do large amounts of bulky mathematical labor (especially repetitive tasks like mining) in greater quantity than CPUs.

ASICs and Beyond
Of course, miners soon grew beyond GPUs and looked for even more efficient hardware, such as FPGAs (field programmable gate arrays) and ASICs (application specific integrated circuits). Both of these types of hardware can be customized for specific uses, like Bitcoin mining, and are capable of very fast and efficient processes. As you might imagine, these specialized chips are very expensive. The rise in popularity of FPGAs or ASICs has effectively increased the barriers to entry for digital currency mining and left any less-invested miners in the dust. New miners just starting out, especially with Bitcoin and other SHA-256 based coins, can not be competitive with the bigger players in the network unless they invest tens of thousands of dollars into hardware for their operations.

Bitcoins in the Data Center
Most traditional servers in data centers, including the ones at Liquid Web, have multi-core CPUs that are perfectly suited to web hosting. They usually have very limited or no GPU facilities and don’t use specialized hardware like FPGAs and ASICs, since their web hosting duties are mostly managed over a text-based remote interface. While it is certainly possible to mine a SHA-256 based coin, like Bitcoin, on one of Liquid Web’s CPU servers, it is not very efficient and won’t be competitive with the other miners in the network. Customers who are looking to mine SHA-256 based coins with their own customized hardware should consider colocating.

Bitcoin mining has already been making a steady shift to the data center environment and away from personal setups in the home. Colocating your mining operation in a data center may in fact be the ideal alternative to setting up an operation in your own home for a number of reasons. First and foremost is that relying on a data center’s network and power means your operation will always be running. Data centers like Liquid Web’s provide premium Tier-1 bandwidth, secure facilities, and N+1 redundancy on all networks, hardware, cooling units, batteries, power systems, and generators. With a colocation plan customers can utilize a data center’s network and uptime guarantees while still remaining competitive with other miners. For customers that are interested in colocating Bitcoin miners, we’d love to discuss the colocation plans that Liquid Web has to offer.

To learn more about what kind of digital currencies might have less expensive barriers to entry, read the second Digital Currencies in the Data Center article.

Are you mining bitcoins? Tell us about your mining adventure in the comments below!

Page 1 of 111234510...Last »

Copyright © 2011 Liquid Web, Inc. All Rights Reserved.