Don’t Turn NUMA NUMA Yay into NUMA NUMA Nay: Checking Your Virtual Machine NUMA Configuration

Written by Joe Kozlowicz on Thursday, May 10th 2018 — Categories: Cloud Hosting, VMware

NUMA architectures allow for greater scalability, which is of course great for building cloud data centers. But if your virtual machines aren’t configured correctly, NUMA can cause performance degradation in VMware virtualized servers.

Here’s an overview of what NUMA is, why it’s useful for cloud computing, and how to address it when configuring your VMware cloud server.

Continue Reading...


Legacy Systems Remain Because They Work — But They Could Be a Major Security Risk

Written by Joe Kozlowicz on Friday, May 4th 2018 — Categories: Data Center Design, IT Modernization, IT Operations, Security

With all the talk about digital transformation and IT modernization, you’d think that everyone was all-in with the cloud at this point. But there are many legacy systems still in production, even at enterprise organizations.

Regardless of why you still have them, there are almost certainly legacy systems within your IT ecosystem, and keeping them secure is of paramount importance, especially if they’re past their support lifecycle and have become exposed to potential vulnerabilities.

Continue Reading...


How Secure is HTTPS? TLS/SSL Increasingly Used to Transmit Malware

Written by Joe Kozlowicz on Thursday, April 26th 2018 — Categories: Networking and Fiber, Security

Encryption over the HTTP protocol, also known as HTTPS or TLS over HTTP is the reason you see a little lock icon next to your web URL. As you likely know, a website using HTTPS has encrypted network traffic. In other words, outside parties or malicious software should not be able to intercept your communications to and from that website, because it is encrypted. Any time you perform a transaction over the internet that involves financial or personal information, you should be certain the web server is using HTTPS.

However, even as TLS (Transport Layer Security, referring to encrypting at the Transport Layer of the seven layer OSI model of networking) has spread to over half of the internet, clever cybercriminals have engineered network packets that actually use TLS within their malware to disguise it.

HTTPS is increasingly being used as a vehicle for malware to spread across the ‘net. While your information may be secure while it is transmitted, the website you’re visiting could still accidentally slip malware to your computer, or host it on its own servers, harvesting your information or installing a virus.

Here’s how TLS / SSL is being used by malicious actors across the net.

Continue Reading...


Network Considerations for the Cloud: It All Comes Down to the App

Written by Joe Kozlowicz on Thursday, April 19th 2018 — Categories: Cloud Hosting, Enterprise Applications, HIPAA Compliance, Networking and Fiber

At Green House Data we like to say there’s no “one size fits all” cloud deployment. That’s why we don’t have base package pricing on the website — every VM is right-sized and designed around our client’s applications and business goals. That philosophy applies to every cloud deployment, and the network considerations aren’t exempt.

Depending on your objectives, the intended use of the application in question, and the location of your users and service providers, your network will have different performance and cost implications.

Let’s take a look at how to prepare your network for varying application deployments in the cloud.

Continue Reading...


Edge Data Centers Aren’t Killing Cloud, They’re Expanding It

Written by Joe Kozlowicz on Wednesday, April 11th 2018 — Categories: Cloud Hosting, Cloud Storage, Data Center Design, IT Modernization

Another year, another trend in the data center world. Although edge data centers first starting making headlines circa 2014 or 2015, they’ve become mainstream as more and more users slurp down increasing amounts of data. That takes serious bandwidth; to the point that many pundits are pointing towards the placement of workloads in edge facilities, rather than the traditional centralized data centers in major markets, as a sign that cloud computing is starting to wane.

On the contrary, edge data centers serve to supplement and improve the reach of even the major cloud computing providers. No major cloud service provider (CSP) is going to only place workloads in major markets. Just look at our neighbors in Cheyenne: Microsoft has a huge facility that they’re actively expanding. Amazon operates data centers in Ohio, which, while central for the US in general and equidistant from major population centers like Chicago and New York, is hardly a major market in itself.

And beyond large scale platforms like Azure or AWS, you have players like Green House Data, who offer smaller scale virtualization from data centers in a myriad of second and third tier markets.

But it's not just about the cloud spreading itself to the edge. Here's why edge computing will be important, but will also become more of a niche deployment model, with cloud remaining the king of application processing and data storage.

Continue Reading...

Chat Now