The Software Development Grenade

Written by Joe Kozlowicz on Wednesday, April 8th 2015 — Categories: Software Development

DevOps was created in response to the disconnect between the development team and the operations team within IT departments. This disconnect stems from a lack of communication and collaboration that creates this “wall of confusion” separating the IT department into two very distinct sections, resulting in low productivity.

Continue Reading...

Green House Data Announces Supervolcano Resistance®, The Ultimate in Data Center Safety

Written by Joe Kozlowicz on Wednesday, April 1st 2015

We like to tout our Cheyenne facilities as some of the safest data centers in the nation. Southeastern Wyoming experiences very few flooding, tornadoes, or earthquakes, and zero hurricanes.

But there is that pesky supervolcano underneath Yellowstone. You know, the one that could obliterate 2/3 of the United States.

That’s why this April 1st, Green House Data is announcing our facility is Supervolcano Resistant®.

Continue Reading...

Sometimes, You Gotta Leave an App Behind (When It Can’t Be Virtualized)

Written by Joe Kozlowicz on Wednesday, March 25th 2015 — Categories: Cloud Hosting, Hybrid Cloud, Cloud Hosting, Data Center Design, Software Development, VMware

Virtualization is a standard practice for IT shops around the world. However, as more data center operators look to consolidate and migrate to new virtualized environments, some legacy applications remain stumbling blocks on the way to a 100% virtualized infrastructure.

Legacy apps are tough nuts to crack: your users are accustomed to them, so they are highly efficient in business use, but they might clash with your more modern IT tools, they might no longer supported by the vendor, or the hardware underneath might be ready to kick the bucket.

“No worries,” I hear you say. “I can just virtualize the platform.”

That might work in most cases, but there are some legacy apps that either just won’t make the leap to virtualization or are too much trouble to virtualize to make it worthwhile. Here are the most common examples run into by our techs:

Continue Reading...

Bloomberg & Now Green House Data: Why is Orangeburg a New Data Center Cluster?

Written by Joe Kozlowicz on Tuesday, March 17th 2015 — Categories: Colocation , Colocation, Data Center Design, Green Data Center, Networking and Fiber

With demand for pre-built data center space continuing to grow, you’d expect to find facilities being built all across the country, with a concentration in major markets, some outliers, and a general distribution around other areas. To some extent, that’s true. But the distribution is hardly uniform, with competing providers and in-house facilities alike suddenly cropping up next to each other.

So what makes these data center clusters happen? Wouldn’t builders like to place facilities in more diverse areas in order to avoid cascading or single-point failures from the same power outage or natural disaster? The decision to build in a cluster goes beyond offering competition in a popular area.

Green House Data’s own data center in Orangeburg, NY is a part of one of these clusters of development, and there are a number of factors why we joined Bloomberg’s giant facility just down Ramland Rd.

Continue Reading...

Don’t Let Your Data Get “Taken”: Avoid Cryptowall

Written by Joe Kozlowicz on Tuesday, March 10th 2015 — Categories: Security

As much as we like to compare ourselves to Liam Neeson, our particular set of skills won’t be able to help you avoid a hefty ransom if you fall victim to Cryptowall.

Cryptowall ransomware programs are usually hidden in e-mail attachments or in web links in shiftier corners of the web. They download and install a malicious program that completely locks down your computer system and all access to data. Without a backup stored outside your computer, you will have to pay a ransom—usually in BitCoin, which can be a hassle to obtain—in order for the hacker behind your plight to grant access to your files and apps.

Unfortunately, we can’t go all Taken to track down and take out the perpetrators. BitCoin is impossible to track as it is anonymous, and the e-mails are often relayed through masking methods. The best we can do is tell you a country of origin (Russia, mostly).

We’ve had a number of our managed services customers affected by Cryptowall attacks recently. While our data centers remain secure, your offsite systems can easily fall victim to encryption attacks without some common sense precautions. Luckily, you can prevent the majority of these attacks with a little staff training. Here’s how to avoid Cryptowall and other encryption hacks.

Continue Reading...

Chat Now