Uh-oh. A virtual machine is down. Or a user accidentally deleted a project they’ve been working on for weeks. Or an application has become corrupted. Or…you get the picture. Good thing you have virtual machine images ready to go in storage (you can create backups using the VMware Consolidated Backup tools, which takes your latest snapshot as a basis for the full image backup). Now all you need to do is decide on a restoration method.
For a full VM restore, you’ll use VMware Converter, while for file-level restoration you’ll use VMware Consolidated Backup (VCB), which also has the choice for centralized, per-group, and self-service restoration.
Our Infrastructure Consultants are here to facilitate the perfect cloud architecture for each customer. This post rounds up some of the most frequently asked questions they get about the gBlock Cloud, from security and encryption to licensing and customer support.
Techs may have the reputation of being data driven, preferring lines of code to creative pursuits, but our support team boasts some serious photography chops. That's why we asked for employee submissions when we started decorating our new data center in Cheyenne.
All of the artwork in the building came from our team, with gorgeous photographs of Wyoming and Colorado taken by Systems Engineer Jim Taylor and Infrastructure Consultant Kyle Prawel. Check out some of their selected work below.
Less than a year remains until Microsoft halts support for Windows Server 2003. Just check the ominous countdown clock on their official migration website. With many systems still running Server 2003, including a plethora of 32-bit applications, now is the time to start a migration plan, if you haven't already.
News of a Bash vulnerability is spreading across the web today, and Green House Data has received multiple inquires from customers about the state of Linux servers, which are susceptible to the exploit. This bug allows remote code execution, so it could be used to distribute malware, run additional exploits, or access data. Bash is a command interpreter that is bundled with many distributions of Linux and Unix. Systems at risk include websites, servers, OS X Macs, routers, and other connected devices.