Curious About Cloud? Our Most Common Questions

Written by Joe Kozlowicz on Wednesday, October 22nd 2014 — Categories: Cloud Hosting, Hybrid Cloud, Cloud Hosting, VMware, FAQs

Our Infrastructure Consultants are here to facilitate the perfect cloud architecture for each customer. This post rounds up some of the most frequently asked questions they get about the gBlock Cloud, from security and encryption to licensing and customer support.

Continue Reading...


The Art of Green House Data

Written by Joe Kozlowicz on Wednesday, October 8th 2014

Techs may have the reputation of being data driven, preferring lines of code to creative pursuits, but our support team boasts some serious photography chops. That's why we asked for employee submissions when we started decorating our new data center in Cheyenne.

All of the artwork in the building came from our team, with gorgeous photographs of Wyoming and Colorado taken by Systems Engineer Jim Taylor and Infrastructure Consultant Kyle Prawel. Check out some of their selected work below.

Continue Reading...


Prepare for Windows Server 2003 End of Life

Written by Joe Kozlowicz on Thursday, October 2nd 2014 — Categories: Cloud Hosting, Colocation , Microsoft, Security

Less than a year remains until Microsoft halts support for Windows Server 2003. Just check the ominous countdown clock on their official migration website. With many systems still running Server 2003, including a plethora of 32-bit applications, now is the time to start a migration plan, if you haven't already.

Continue Reading...


Worse Than Heartbleed? ‘Shell Shock’ Bash Vulnerability Hits Linux, OS X Boxes

Written by Joe Kozlowicz on Thursday, September 25th 2014 — Categories: Security

News of a Bash vulnerability is spreading across the web today, and Green House Data has received multiple inquires from customers about the state of Linux servers, which are susceptible to the exploit. This bug allows remote code execution, so it could be used to distribute malware, run additional exploits, or access data. Bash is a command interpreter that is bundled with many distributions of Linux and Unix. Systems at risk include websites, servers, OS X Macs, routers, and other connected devices.

Continue Reading...


Set Up and Configure vSphere Alarms for Resource Use, Suspicious Activity, and More

Written by Joe Kozlowicz on Wednesday, September 17th 2014 — Categories: Cloud Hosting, Cloud Hosting, Security, VMware

As you build out your cloud resources, you may begin to feel overwhelmed with the different elements that need your attention. Even if you have smaller environments, notifications are essential in case something is about to break or has already gone wrong.

VMware vSphere includes default alarms as well as the ability to add custom alarms that can notify admins for various events, conditions, or states. You can set up and configure alarms from the vSphere web client or native application.

Continue Reading...

Chat Now