Wrangle Shadow IT and Empower BYOD with Hybrid Cloud

Written by Joe Kozlowicz on Wednesday, September 18th 2013 — Categories: Cloud Hosting, Hybrid Cloud, Cloud Hosting, Security, Virtual Desktop

You’ve likely heard of “shadow IT” or BYOD (bring your own device). Both terms refer to employees using private devices or software at the workplace—think iPads for work, or Google Drive to share files in a department. These practices may not be sanctioned by the IT department, but they improve productivity and save provisioning costs. However, they come with the risk of security breaches or other issues, causing IT headaches. By implementing an official BYOD policy and deploying hybrid cloud tools, companies can eliminate shadow IT and empower employees at the same time.

Continue Reading...


The Internet of Things

Written by Joe Kozlowicz on Thursday, September 12th 2013

The idea behind the Internet of Things is the complete automation of communication between all the things. In this situation a “thing” is essentially anything that can be assigned a piece of hardware and an IP address. The IP address allows the things to interact among themselves, thus removing the need for any human-to-human communication.

Kevin Ashton first coined the name for this technology filled future in 1999 but the foundation of the idea was started in the 1980’s when companies first began using technology to communicate with machines. Each year the advances in technology built on and confirmed the premise of the Internet of Things.

Continue Reading...


Dropbox Cloud Hacked: How Safe is SSL?

Written by Joe Kozlowicz on Tuesday, September 10th 2013 — Categories: Cloud Hosting, Cloud Storage, Security

At the end of August, news broke that two hackers had broken the two-factor security deployed by Dropbox, a cloud storage platform used by millions of people across the globe. The hackers published their methods in order to promote an open-source version of the program that could, they claimed, be safer for users overall. The hack puts cloud providers and users on edge: how safe is SSL?

Continue Reading...


The Four Layers of Data Center Security

Written by Joe Kozlowicz on Wednesday, September 4th 2013 — Categories: Colocation , Colocation, Data Center Design, Security

Although digital security is paramount to keeping your business data safe within our data center, and for meeting compliance standards, the physical security measures are just as important. For example, our HIPAA infographic shows how many data breaches result from stolen equipment. These threats are largely internal in nature, which is why four layers of security—physical facility security, that is—help ensure the safety of equipment and information stored in our facility.

Continue Reading...


Cheyenne Data Center Groundbreaking Ceremony

Written by Joe Kozlowicz on Friday, August 30th 2013 — Categories: Green Data Center

It has been a very exciting week at Green House Data and we'd like to share some of our excitement with you! On Tuesday morning we hosted the groundbreaking ceremony for our new energy efficient data center in Cheyenne, WY. We have been working on this project for quite some time and are thrilled to officially be moving forward! Wyoming was kind enough to give us a gorgeous day for our ceremony and the turnout was great. During the ceremony we heard from a few people who have been integral in this project, such as Govenor Mead, Bob Jenson from the Wyoming Business Council, Randy Bruns from Cheyenne LEADS and Corey Welp with 1547 Critical Systems Realty.

Continue Reading...

Chat Now