Cloud computing is built on virtualization, a technology concept that allows multiple virtual machines to run on a single server. Although this means data centers can squeeze much more computing power out of each server, it also brings a set of additional security risks. Without insight into the other environments using the same server resources as your virtual machines, how can you protect your own data from malicious attacks on other tenants?
For some small businesses, the security risk associated with multitenant cloud is outweighed by the security gains of having the provider’s skilled information security specialists working on their environment, whereas they may have lacked a dedicated security staff in the past. However, other risks increase as virtual network tools and hypervisors present additional attack surfaces.
November 2015 Update - As Green House Data has expanded nationwide, our ranks have been joined by several additional veterans in Washington and New York. Their stories will soon be added to this post.
As the home of a strategic missile base (Warren Air Force Base), you might expect Cheyenne to have its fair share of military veterans. Green House Data is happy to have the skills of eleven vets on board, with a combined service record of over 70 years—but not all of them in the Air Force.
They’ve served at home and abroad, as far as Macedonia and Iraq, with duties as varied as military police work and computing firing data. In honor of Veteran’s Day and their service, we asked them a bit about their experience and how they made the transition from the military to Information Technology.
You’re probably familiar with “swamp cooling” at home, especially if you live in the dry West like we do. Swamp cooling is evaporative cooling, a more efficient method of air conditioning than vapor compression or absorption refrigeration, the latter relying on refrigerant that contributes to ozone depletion, in addition to consuming more energy. Free cooling has made inroads in the data center and is common in many new builds and retrofits as a method of saving energy and water alike, leading to its nickname of “free cooling”.
Uh-oh. A virtual machine is down. Or a user accidentally deleted a project they’ve been working on for weeks. Or an application has become corrupted. Or…you get the picture. Good thing you have virtual machine images ready to go in storage (you can create backups using the VMware Consolidated Backup tools, which takes your latest snapshot as a basis for the full image backup). Now all you need to do is decide on a restoration method.
For a full VM restore, you’ll use VMware Converter, while for file-level restoration you’ll use VMware Consolidated Backup (VCB), which also has the choice for centralized, per-group, and self-service restoration.
Our Infrastructure Consultants are here to facilitate the perfect cloud architecture for each customer. This post rounds up some of the most frequently asked questions they get about the gBlock Cloud, from security and encryption to licensing and customer support.