Application performance can often hinge on how well your storage can serve data to end clients. For this reason you must correctly design or choose your storage tier speed in terms of both IOPS and throughput, which rate the speed and bandwidth of the storage respectively.
It is vital to plan according to manufacturer and developer recommendations as well as real-world benchmarks to maximize your storage (and subsequently application) performance. Take a look at peak IOPS and throughput ratings, read/write ratios, RAID penalties, and physical latency.
Our cloud engineering team wears many hats, with different roles taking on different pieces of the nationwide gBlock™ Cloud falling to different staff members, but everyone pulling their weight on a wide variety of projects simultaneously.
Our new blog series digs into the daily life of our technology staff, focusing on their challenges, routines, and goals, to provide insight for those who are eying the IT field, or customers and friends who may be curious what goes on behind the scenes at a cloud data center.
This week, we talk to Senior Cloud Technologist Josh Larsen, who has moved around in different roles for Green House Data for over six years. As Cloud Technologist, his job largely entails forecasting and planning for large-scale cloud projects across our entire environment.
The B Corp movement continues to grow and spread throughout the world, with more and more companies of all sizes and industries looking towards B Corp Certification as a guide towards sustainability, positive relationships with employees and stakeholders, community involvement, and overall impact.
Green House Data is proud to announce that our recertification last year placed us among the Best for the World: Changemakers list, which honors organizations that significantly improved their B Impact certification rating.
It seems like every week some piece of your stack has a security advisory or a new version. While only the critical vulnerabilities or bugs might need immediate installation, inevitably you’ll be juggling dozens of versions, trying to decide which system requires a update and which you’ve already patched.
There are a few official and unofficial places to keep you in the loop on software lifecycle management, and by regularly using them in addition to your own tracking tools or spreadsheets, you can keep your IT environment safe and up-to-date.
With proliferating security tools, in addition to more systems and users taking advantage of cloud resources, IT perimeter security is feels more difficult to enforce with each passing day.
Use this checklist to quickly cover your IT perimeter and network security protocols and make sure nothing is slipping through the cracks.