With demand for pre-built data center space continuing to grow, you’d expect to find facilities being built all across the country, with a concentration in major markets, some outliers, and a general distribution around other areas. To some extent, that’s true. But the distribution is hardly uniform, with competing providers and in-house facilities alike suddenly cropping up next to each other.
So what makes these data center clusters happen? Wouldn’t builders like to place facilities in more diverse areas in order to avoid cascading or single-point failures from the same power outage or natural disaster? The decision to build in a cluster goes beyond offering competition in a popular area.
Green House Data’s own data center in Orangeburg, NY is a part of one of these clusters of development, and there are a number of factors why we joined Bloomberg’s giant facility just down Ramland Rd.
As much as we like to compare ourselves to Liam Neeson, our particular set of skills won’t be able to help you avoid a hefty ransom if you fall victim to Cryptowall.
Cryptowall ransomware programs are usually hidden in e-mail attachments or in web links in shiftier corners of the web. They download and install a malicious program that completely locks down your computer system and all access to data. Without a backup stored outside your computer, you will have to pay a ransom—usually in BitCoin, which can be a hassle to obtain—in order for the hacker behind your plight to grant access to your files and apps.
Unfortunately, we can’t go all Taken to track down and take out the perpetrators. BitCoin is impossible to track as it is anonymous, and the e-mails are often relayed through masking methods. The best we can do is tell you a country of origin (Russia, mostly).
We’ve had a number of our managed services customers affected by Cryptowall attacks recently. While our data centers remain secure, your offsite systems can easily fall victim to encryption attacks without some common sense precautions. Luckily, you can prevent the majority of these attacks with a little staff training. Here’s how to avoid Cryptowall and other encryption hacks.
By now, even your non-techy mom has probably heard of Big Data, with IBM and others advertising it on TV and every other IT vendor pushing their platform. If you don't know about big data, here is it is in a nutshell: as more and more devices are connected to the internet and storage capabilities continue to advance, we’re able to collect, store, and run analytics on massive sets of information in order to discover insights and make more informed decisions.
Some industries like research, oil and gas, manufacturing, and logistics, have been doing this for years, often on dedicated hardware. The advantages of virtualization can be levied for big data use, too, even though at its core, big data is focused on distribution of jobs over a wide array of resources, while virtualization as a concept is the exact opposite.
If you’re gearing up for a big data deployment, you can use VMware tools to stack it on top of virtual machines, allowing you to add resources easily when you need to run large analytics jobs and scale back when you don’t need as much processing power or want to delete old unused datasets from storage. This elasticity helps maximize your available compute resources and can be used in a mixed-workload environment. Plus, you can manage and automate your big data VMs from the same tools as your other infrastructure.
Here is quick primer on what to keep in mind with VMware big data platforms.
Early this month, VMware announced vSphere 6.0, the latest version of the most popular and powerful enterprise virtualization platform. As a longtime VMware shop with a number of VCP certified professionals, we’re excited for a number of the new features included in the latest release.
According to VMware’s CEO, vSphere 6.0 has over 650 new features. Green House Data doesn’t yet have a timeline for upgrading from 5.5 just yet (6.0 hasn’t received General Availability), but here’s what we’re most excited about.
Security is already high on the totem pole of IT priorities, but with 2015 kicking off with a massive Anthem health breach, encryption is a hotter topic than ever.
Many compliance mandates require or encourage some form of encryption, including the commonly encountered PCI and HIPAA standards (the HIPAA Security Rule, while it doesn’t require encryption, does require you to prove, in writing, why you believed encryption wasn’t necessary in your special case. Which, let’s be honest, if you are disclosing a large breach to the public as required, encryption was probably necessary).
There are many encryption methods and vendors on the market, but all of them require access to an encryption key in order to unscramble encoded data. If a malicious agent gets their hands on this key, it’s game over for your encrypted information.
This means that every enterprise needs a secure, organized system to manage all of their encryption keys. As data sets are updated with new keys, new data is added, different encryption systems are introduced, and user access is modified, encryption key management becomes even more essential.