MBJ: Green House Data targets Omaha with Deliveron acquisition

Written by Joe Kozlowicz on Monday, February 10th 2020

On January 24th we were thrilled to see Deliveron leadership gracing the front page of the Midlands Business Journal, the weekly business paper of Omaha, Lincoln, and Council Bluffs.

The piece, which can be read below in its entirety, covers the history of Deliveron and its founders, the strategy behind the Green House Data acquisition of Deliveron, and the ways that DevOps and Digital Transformation are changing the marketplace for IT services.

Continue Reading...


How Azure Migrate Helps You Assess Cloud Readiness

Written by Joe Kozlowicz on Thursday, February 6th 2020 — Categories: Azure, Migration, Cloud Hosting, Cloud Storage, Microsoft

Every cloud migration follows the same general path: assessment, optimization, security protocol, and management. As your cloud environment matures, the latter three phases should be repeated to refine and improve your operations.

One native Azure tool that can be useful to begin this cloud journey is Azure Migrate. It consists of Azure Server Assessment and Azure Server Migration. Assessment is a discovery tool helps you assess cloud readiness and collect valuable intelligence about your virtual machines and associated infrastructure so you can be prepared to replace them in Azure. Migration, as you might expect, can actually migrate those servers to Azure.

Within the Azure Migrate hub are also database migration tools, Movere (an assessment tool purchased by Microsoft), a web app migration assistant, and Azure Data Box which assists with large scale data migration without using the internet.

This blog will focus on the Server Assessment tool, which helps you plan for cloud readiness, budget, and target environment architecture within Azure. Learn if it will work with your target environment, what it reports, and how it can lay the groundwork for a successful migration.

Continue Reading...


Anglin’ for Your Creds: Phishing via Social Media Connections

Written by Joe Kozlowicz on Thursday, December 19th 2019 — Categories: Security

This past week Green House Data employees found an invitation to connect in their LinkedIn inboxes from one Coleman Anglin, who claimed to be a Marketing Specialist at the company (unsurprisingly, no one in the marketing department received this invitation). 

Of course the humorous last name of “Anglin” belies the true nature of this connection: phishing. While our security team was swift to send out a notice not to connect to this individual, the attempt highlights a growing trend of phishing attacks reaching beyond e-mail to the social media realm.

But why bother posing as a fellow employee or a friend on social media? Several employees asked what the threat could be from this seemingly innocuous connection, even if it was made in bad faith. 

Continue Reading...


Shift Left? Shift Right? Continuous Improvement Depends on Both

Written by Joe Kozlowicz on Thursday, December 12th 2019 — Categories: DevOps, Enterprise Applications, IT Operations

As you dig into DevOps methodology, you’re likely to encounter the term “shift left” and the slightly less common “shift right.” What exactly are we shifting here?

The two terms are sides of the same coin. They refer to when you will test your application or piece of technology – is it during development or once your solution has already entered production? Of course, for true DevOps success, the answer is both! Continuous improvement involves testing at all phases of the application lifecycle.

Let’s take a closer look at the ideology behind “shift left” and its counterpart as well as how they affect the development cycle (which can also be applied beyond app development itself and used when designing and deploying most IT systems).

Continue Reading...


The InfoSec Threat Lineup: Biggest Threats from 2019

Written by Joe Kozlowicz on Friday, December 6th 2019 — Categories: Security

As we approach year-end and look forward to future tech trends, we also reflect on the lessons learned over the past year. In the information security realm, things seem to stay the same even as they change.

Pervasive and persistent threats that are hardly new to the scene have made their way past small fry to take down some of the biggest service providers around. In many ways, 2019 proved the most effective threat vectors remain the most difficult to protect against, with the crucial attack point coming in the form of people – the hardest thing to control for within your organization.

There are some newer threats to consider as well, of course. Hackers never sleep!

Here’s our lineup for the nastiest InfoSec baddies of 2019.

Continue Reading...