6 Signs Your IT Infrastructure is On the Verge of Failure

Written by Joe Kozlowicz on Tuesday, May 22nd 2018 — Categories: Data Center Design, IT Modernization, IT Operations

Eventually all IT systems age out of their usefulness, marked by frequently required maintenance, mandatory end of life from vendor support, and increased costs for your business. You may even run into some downtime.

IT infrastructure that is on the verge of failure may still appear to be working fine — but it still leads to sneaky problems, including higher operational costs, lower reliability, limited agility, and less opportunity to embrace new applications or technologies. Legacy infrastructure can also be much less secure.

But how do you know when your infrastructure is truly about to kick the bucket? Here are six major warning signs that it’s time to bite the bullet and modernize your IT.

Continue Reading...


Green Data Centers in 2018: How Has Industry Opinion Shifted?

Written by Joe Kozlowicz on Thursday, May 17th 2018 — Categories: Data Center Design, Green Data Center

As we release our 2017 Sustainability Report, we wanted to see how the industry opinion on green data centers may have shifted over the years.

Back in late 2014/early 2015, Green House Data put out a survey for data center workers asking for their opinions on green data centers. We recently sent out a follow up survey and the results were surprising, to say the least. Read on to learn how the industry view of energy efficiency and sustainability in the data center has changed.

Continue Reading...


Don’t Turn NUMA NUMA Yay into NUMA NUMA Nay: Checking Your Virtual Machine NUMA Configuration

Written by Joe Kozlowicz on Thursday, May 10th 2018 — Categories: Cloud Hosting, VMware

NUMA architectures allow for greater scalability, which is of course great for building cloud data centers. But if your virtual machines aren’t configured correctly, NUMA can cause performance degradation in VMware virtualized servers.

Here’s an overview of what NUMA is, why it’s useful for cloud computing, and how to address it when configuring your VMware cloud server.

Continue Reading...


Legacy Systems Remain Because They Work — But They Could Be a Major Security Risk

Written by Joe Kozlowicz on Friday, May 4th 2018 — Categories: Data Center Design, IT Modernization, IT Operations, Security

With all the talk about digital transformation and IT modernization, you’d think that everyone was all-in with the cloud at this point. But there are many legacy systems still in production, even at enterprise organizations.

Regardless of why you still have them, there are almost certainly legacy systems within your IT ecosystem, and keeping them secure is of paramount importance, especially if they’re past their support lifecycle and have become exposed to potential vulnerabilities.

Continue Reading...


How Secure is HTTPS? TLS/SSL Increasingly Used to Transmit Malware

Written by Joe Kozlowicz on Thursday, April 26th 2018 — Categories: Networking and Fiber, Security

Encryption over the HTTP protocol, also known as HTTPS or TLS over HTTP is the reason you see a little lock icon next to your web URL. As you likely know, a website using HTTPS has encrypted network traffic. In other words, outside parties or malicious software should not be able to intercept your communications to and from that website, because it is encrypted. Any time you perform a transaction over the internet that involves financial or personal information, you should be certain the web server is using HTTPS.

However, even as TLS (Transport Layer Security, referring to encrypting at the Transport Layer of the seven layer OSI model of networking) has spread to over half of the internet, clever cybercriminals have engineered network packets that actually use TLS within their malware to disguise it.

HTTPS is increasingly being used as a vehicle for malware to spread across the ‘net. While your information may be secure while it is transmitted, the website you’re visiting could still accidentally slip malware to your computer, or host it on its own servers, harvesting your information or installing a virus.

Here’s how TLS / SSL is being used by malicious actors across the net.

Continue Reading...

Chat Now