<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" media="screen" href="/~files/feed.xsl"?>
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                             
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:feedpress="https://feed.press/xmlns" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <feedpress:locale>en</feedpress:locale>
    <atom:link rel="self" href="https://feedpress.me/greenhousedata"/>
    <atom:link rel="hub" href="http://feedpress.superfeedr.com/"/>
    <title><![CDATA[GreenHouseData Blog]]></title>
    <link>https://www.greenhousedata.com/blog</link>
    <description/>
    <dc:language>en</dc:language>
    <dc:creator>jhann@greenhousedata.com</dc:creator>
    <dc:rights>Copyright 2020</dc:rights>
    <dc:date>2020-08-25T21:39:00+00:00</dc:date>
    <admin:generatorAgent rdf:resource="http://expressionengine.com/"/>
    <item>
      <title><![CDATA[ Patch Automation Comparison: SCCM Orchestration Groups vs. Beekeeper ]]></title>
      <link>https://www.greenhousedata.com/blog/patch-automation-comparison-sccm-orchestration-groups-vs.-beekeeper</link>
      <guid>https://www.greenhousedata.com/blog/patch-automation-comparison-sccm-orchestration-groups-vs.-beekeeper#When:21:39:00Z</guid>
      <description><![CDATA[<p>In version 1909 of Configuration Manager, Microsoft implemented Orchestration Groups as a Pre-Release feature.</p>

<p>Orchestration Groups enable a few basic patching automation features, such as setting the patch installation order and specifying scripts to run before or after the patch is installed. These are very basic options that our <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper Patching Automation software for System Center</a>&nbsp;has been doing for years.</p>

<p>How does Beekeeper stack up in comparison to the pre-release features introduced in the newer versions of SCCM? Let&#39;s compare apples to apples.</p>]]></description>
      <dc:subject><![CDATA[Patching, Beekeeper Software,]]></dc:subject>
      <dc:date>2020-08-25T21:39:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ 3 Reasons Ransomware Mitigation is Harder Than You Think ]]></title>
      <link>https://www.greenhousedata.com/blog/3-reasons-ransomware-mitigation-is-harder-than-you-think</link>
      <guid>https://www.greenhousedata.com/blog/3-reasons-ransomware-mitigation-is-harder-than-you-think#When:17:01:00Z</guid>
      <description><![CDATA[<p>High-profile ransomware attacks made headlines again last month as Garmin and Canon both suffered significant outages. Garmin&rsquo;s in particular appeared to take down the majority of their public-facing systems, from the Garmin Connect app to critical aeronautical navigation services.</p>

<p>The media claims Garmin ended up paying a hefty multimillion-dollar ransom to unlock their infrastructure. A fine prize for the alleged perpetrators, &ldquo;Evil Corp,&rdquo; who supposedly used a variant known as WastedLocker to lockdown Garmin&rsquo;s apps and services.</p>

<p>How could an organization with the resources and talent of Garmin face a multiday outage under intense scrutiny? While dodging ransomware may seem as simple as restoring a backup, in practice a large-scale attack is a major mitigation undertaking. Here are three reasons why it can take days or even weeks to recover even if you give in and pay the ransom.</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2020-08-20T17:01:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How to Migrate Azure AD Connect to a New Server Within the Same Forest ]]></title>
      <link>https://www.greenhousedata.com/blog/how-to-migrate-azure-ad-connect-to-a-new-server-within-the-same-forest</link>
      <guid>https://www.greenhousedata.com/blog/how-to-migrate-azure-ad-connect-to-a-new-server-within-the-same-forest#When:23:04:00Z</guid>
      <description><![CDATA[<p>With <a href="https://www.greenhousedata.com/blog/what-should-you-do-about-windows-7-and-windows-server-2008-eol">Windows Server 2008 reaching end of life</a>, decommissioning the old servers still running in your production environment poses a serious security risk. Sometimes you still have some critical services running on them that need to move to another server before they can be decommissioned. Recently I had to migrate Azure AD Connect from an old 2008 domain controller to a new Windows 2019 server.</p>

<p>Most of the guides I found online only talk about how to do a fresh install of Azure AD Connect. I wanted to be able to preserve all the existing rules and settings and not disrupt anything for the users. It is possible to manually document all the settings by digging deep into the Azure AD Connect tool, but there is always a chance to miss something.</p>

<p>Here are the steps I followed to do it.</p>]]></description>
      <dc:subject><![CDATA[Azure, Active Directory, IT Modernization,]]></dc:subject>
      <dc:date>2020-07-29T23:04:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Our Top Announcements and News from Microsoft Build 2020 ]]></title>
      <link>https://www.greenhousedata.com/blog/our-top-announcements-and-news-from-microsoft-build-2020</link>
      <guid>https://www.greenhousedata.com/blog/our-top-announcements-and-news-from-microsoft-build-2020#When:19:50:00Z</guid>
      <description><![CDATA[<p>At Green House Data, we help deliver a wide range of technology solutions for our customers, including many as a Microsoft partner and MSP. It&rsquo;s vital for us to understand the strategic direction at Microsoft and the direction of the overall industry, so we naturally were paying close attention to see which announcement at Build 2020 might be relevant.</p>

<p>Like many other technology conferences in the shadow of COVID-19, Microsoft decided to go all-digital for this year&rsquo;s edition of Build, the company&rsquo;s massive annual developer-focused conference. The affect of COVID-19 on Build 2020 couldn&rsquo;t have been more obvious than <a href="https://mybuild.microsoft.com/sessions/871ef73f-f04a-405b-a0fa-01d7433067d1?source=sessions" target="_blank">the &ldquo;work from home&rdquo;-style keynote</a> that Scott Hanselman and friends did.</p>

<p>This year was the 10<sup>th</sup> edition of Build and due to the digital nature was even entirely free to attend. 48-hours of sessions were peppered with news about Azure, .NET, Windows, Microsoft 365, GitHub, and more, alongside educational content in the form of Q&amp;As and tutorials.</p>

<p>Read on to discover our top picks from Build 2020.</p>]]></description>
      <dc:subject><![CDATA[Azure, Windows 10, O365, DevOps, Microsoft, Software Development,]]></dc:subject>
      <dc:date>2020-06-04T19:50:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Beekeeper 5.2.0 Release Notes ]]></title>
      <link>https://www.greenhousedata.com/blog/beekeeper-5.2.0-release-notes</link>
      <guid>https://www.greenhousedata.com/blog/beekeeper-5.2.0-release-notes#When:14:55:00Z</guid>
      <description><![CDATA[<p>The latest version of our <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper patching automation software</a>&nbsp;for System Center brings great new features like parallel patching, SQL Availability Group compatibility, daily scheduling, and more.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Product Information,]]></dc:subject>
      <dc:date>2020-06-03T14:55:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Why We’re Excited About Fluid Framework in Microsoft 365 ]]></title>
      <link>https://www.greenhousedata.com/blog/why-were-excited-about-fluid-framework-in-microsoft-365</link>
      <guid>https://www.greenhousedata.com/blog/why-were-excited-about-fluid-framework-in-microsoft-365#When:21:41:00Z</guid>
      <description><![CDATA[<p>First introduced in 2019, Fluid Framework has made a reappearance at this year&rsquo;s digital-version of the Microsoft Build conference, and it&rsquo;s now <a href="https://support.microsoft.com/en-us/office/get-started-with-fluid-framework-preview-d05278db-b82b-4d1f-8523-cf0c9c2fb2df">available for preview</a> with some initial releases for Office.com and Outlook clients coming soon.</p>

<p>But what is this new framework for productivity applications? Here&rsquo;s why we&rsquo;re excited about Fluid and the changes it may bring to the way we collaborate and work digitally.</p>]]></description>
      <dc:subject><![CDATA[O365, Enterprise Applications, Microsoft,]]></dc:subject>
      <dc:date>2020-05-22T21:41:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Identifying Your Business Continuity Priorities ]]></title>
      <link>https://www.greenhousedata.com/blog/identifying-your-business-continuity-priorities</link>
      <guid>https://www.greenhousedata.com/blog/identifying-your-business-continuity-priorities#When:16:52:00Z</guid>
      <description><![CDATA[<p>As an IT leader, you&rsquo;ll have personnel to consider in your business continuity plans, with additional considerations for any data center space you operate, perhaps some critical heavy equipment, and desktop and mobile hardware. But your primary role within business continuity is likely to be disaster recovery focused, simply because you must keep crucial applications and data available to those stakeholders and operational sites deemed essential.</p>

<p>Your DR plan should focus on recovering key essential technical functions while also considering the supporting tools, applications, data collaboration, and potential workforce displacement.</p>

<p>But how exactly do you identify which systems are critical &ndash; and in need of faster time to recovery &ndash; and which can rely on more simple backup methods? Here are four key questions to ask yourself as you prioritize within your continuity plan.</p>]]></description>
      <dc:subject><![CDATA[Disaster Recovery, IT Operations,]]></dc:subject>
      <dc:date>2020-05-15T16:52:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Using System Center to Reduce VPN Congestion from Remote Workstation Updates ]]></title>
      <link>https://www.greenhousedata.com/blog/using-system-center-to-reduce-vpn-congestion-from-remote-workstation-updates</link>
      <guid>https://www.greenhousedata.com/blog/using-system-center-to-reduce-vpn-congestion-from-remote-workstation-updates#When:19:35:00Z</guid>
      <description><![CDATA[<p>During this challenging time, we need to make sure our infrastructure is available for our quickly evolving remote workforce while ensuring security and compliance.</p>

<p>Many organizations have sent devices home with employees so they can work remotely. Your standard monthly Windows and security updates &mdash; typically distributed across a high speed, corporate network &mdash; can now potentially create bandwidth and user performance issues if received over the corporate VPN. It&rsquo;s critical to maintain patching and compliance schedules while minimizing traffic spikes over your VPN that can cause connectivity and performance issues.</p>]]></description>
      <dc:subject><![CDATA[Azure, Patching, SCCM, Enterprise Applications, IT Operations,]]></dc:subject>
      <dc:date>2020-04-28T19:35:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ 4 Digital Transformation Focus Areas During a Pandemic ]]></title>
      <link>https://www.greenhousedata.com/blog/4-digital-transformation-focus-areas-during-a-pandemic</link>
      <guid>https://www.greenhousedata.com/blog/4-digital-transformation-focus-areas-during-a-pandemic#When:20:51:00Z</guid>
      <description><![CDATA[<p><em>You&rsquo;ve already been disrupted &ndash;- now see why this is an opportunity for transformation.</em></p>

<p>The COVID-19 pandemic has thrown a wrench into many IT plans and budgets for 2020. We won&rsquo;t dive into that right now, as it&rsquo;s been said many times over.</p>

<p>Now, many IT managers are turning towards the grim possibility of reduced budget. With economic uncertainty looming, it may be enough to just keep the proverbial lights on. This is a great time to take a look at both short- and long-term opportunities presented by pursue digital transformation.</p>

<p>Your daily operations are already disrupted. Your users are adopting new ways of working. And even if your IT staff and budget are stretched thin, many aspects of digital transformation can actually help you increase efficiency and deliver more value to your organization.</p>

<p>Here are the most vital transformative measures to focus on during this time of upheaval.</p>]]></description>
      <dc:subject><![CDATA[Datacenter Automation, DevOps, IT Operations, Digital Transformation,]]></dc:subject>
      <dc:date>2020-04-09T20:51:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Client Advisory: COVID-19 (AKA Coronavirus) ]]></title>
      <link>https://www.greenhousedata.com/blog/covid-19-aka-coronavirus-advisory</link>
      <guid>https://www.greenhousedata.com/blog/covid-19-aka-coronavirus-advisory#When:19:54:00Z</guid>
      <description><![CDATA[<p>Please note that Green House Data is actively tracking the spread of COVID-19, also known as the coronavirus. We have taken proactive steps, including implementing&nbsp;precautionary measures to ensure the safety of our personnel and to support the continuity of our operations.</p>]]></description>
      <dc:subject><![CDATA[IT Operations, Security,]]></dc:subject>
      <dc:date>2020-02-28T19:54:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ MBJ: Green House Data targets Omaha with Deliveron acquisition ]]></title>
      <link>https://www.greenhousedata.com/blog/mbj-green-house-data-targets-omaha-with-deliveron-acquisition</link>
      <guid>https://www.greenhousedata.com/blog/mbj-green-house-data-targets-omaha-with-deliveron-acquisition#When:17:47:00Z</guid>
      <description><![CDATA[<p>On January 24th we were thrilled to see <a href="https://www.deliveron.com/">Deliveron</a>&nbsp;leadership gracing the front page of the Midlands Business Journal, the weekly business paper of Omaha, Lincoln, and Council Bluffs.</p>

<p>The piece, which can be read below in its entirety, covers the history of Deliveron and its founders, the&nbsp;strategy behind the Green House Data acquisition of Deliveron, and the ways that DevOps and Digital Transformation are changing the marketplace for IT services.</p>]]></description>
      <dc:subject><![CDATA[]]></dc:subject>
      <dc:date>2020-02-10T17:47:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How Azure Migrate Helps You Assess Cloud Readiness ]]></title>
      <link>https://www.greenhousedata.com/blog/how-azure-migrate-helps-you-assess-cloud-readiness</link>
      <guid>https://www.greenhousedata.com/blog/how-azure-migrate-helps-you-assess-cloud-readiness#When:23:33:00Z</guid>
      <description><![CDATA[<p>Every cloud migration follows the same general path: assessment, optimization, security protocol, and management. As your cloud environment matures, the latter three phases should be repeated to refine and improve your operations.</p>

<p>One native Azure tool that can be useful to begin this cloud journey is Azure Migrate. It consists of Azure Server Assessment and Azure Server Migration. Assessment is a discovery tool helps you assess cloud readiness and collect valuable intelligence about your virtual machines and associated infrastructure so you can be prepared to replace them in Azure. Migration, as you might expect, can actually migrate those servers to Azure.</p>

<p>Within the Azure Migrate hub are also database migration tools, Movere (an assessment tool purchased by Microsoft), a web app migration assistant, and Azure Data Box which assists with large scale data migration without using the internet.</p>

<p>This blog will focus on the Server Assessment tool, which helps you plan for cloud readiness, budget, and target environment architecture within Azure. Learn if it will work with your target environment, what it reports, and how it can lay the groundwork for a successful migration.</p>]]></description>
      <dc:subject><![CDATA[Azure, Migration, Cloud Hosting, Cloud Storage, Microsoft,]]></dc:subject>
      <dc:date>2020-02-06T23:33:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Digital Transformation vs. Innovation: Where Should You Focus in 2020? ]]></title>
      <link>https://www.greenhousedata.com/blog/digital-transformation-vs.-innovation-where-should-you-focus-in-2020</link>
      <guid>https://www.greenhousedata.com/blog/digital-transformation-vs.-innovation-where-should-you-focus-in-2020#When:18:22:00Z</guid>
      <description><![CDATA[<p>As we look forward to the new year and the new decade, it&rsquo;s time for business leaders to identify how they want to drive their organization into the future. What new technologies, tools, processes&#8212;and, quite frankly, people&#8212;do you need to better serve your clients, stakeholders, employees, and community?</p>

<p>For 8 in 10 organizations, <a href="https://www.mckinsey.com/business-functions/organization/our-insights/unlocking-success-in-digital-transformations">digital transformation has been a focus within the past five years</a>. Meanwhile, <a href="https://www.mckinsey.com/business-functions/strategy-and-corporate-finance/how-we-help-clients/growth-and-innovation">84% see innovation as key to success</a>. So it&rsquo;s likely either transformation or innovation will reach your whiteboard as a top initiative in 2020. But what do these terms really mean in practice? Aren&rsquo;t they kind of synonymous? Well, not really. Once you dig into the meat of digital transformation, you realize it <em>could </em>lead to innovation. And if you can truly innovate, chances are you&rsquo;ll need to transform your digital operations to follow through.</p>

<p>Where should you focus your efforts? That depends on the state of your IT and application teams along with your overall mission.</p>]]></description>
      <dc:subject><![CDATA[Enterprise Applications, IT Modernization, IT Operations, Digital Transformation,]]></dc:subject>
      <dc:date>2020-01-24T18:22:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What Should You Do About Windows 7 and Windows Server 2008 EOL? ]]></title>
      <link>https://www.greenhousedata.com/blog/what-should-you-do-about-windows-7-and-windows-server-2008-eol</link>
      <guid>https://www.greenhousedata.com/blog/what-should-you-do-about-windows-7-and-windows-server-2008-eol#When:23:19:00Z</guid>
      <description><![CDATA[<p>Two major enterprise computing platforms are reaching their end of life this week. Tomorrow (January 14<sup>th</sup>), in fact. While this may seem like a last-minute blog entry, we know there are plenty of you out there still running Windows 7 on corporate desktops and Windows Server 2008 or 2008 R2 in your data centers.</p>

<p>Microsoft itself <a href="https://rcpmag.com/blogs/scott-bekker/2019/07/microsoft-inspire-2019-11-quotes.aspx">estimated that 60% of its Windows Server install base was still running 2008</a> back in August. Some of those instances may have been upgraded or migrated to cloud VMs, but we&rsquo;re betting many of them remain. Unofficial estimates peg <a href="https://www.zdnet.com/article/how-many-pcs-are-still-running-windows-7-today/">the number of Windows 7 machines worldwide</a> at around 200 million.</p>

<p>Change can be hard, especially when your systems seem to be working properly and upgrading appears to be a complex and time-consuming endeavor. But operating systems that have reached End of Support open the door for vulnerabilities, bugs, and incompatibility with newer infrastructure. They also make it more difficult to deploy and support newer software that can improve employee efficiency and empower the business to drive revenue in new areas and to compete with others in the industry. With Windows 7 and Windows Server 2008 End of Support upon us, what are your options?</p>]]></description>
      <dc:subject><![CDATA[Azure, Windows 10, Migration, Desktop Modernization, Cloud Hosting, Enterprise Applications, IT Modernization, IT Operations, Microsoft, Virtual Desktop,]]></dc:subject>
      <dc:date>2020-01-13T23:19:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Beekeeper Patch Automation: Powershell Validation Mneumonics and Recovery Actions ]]></title>
      <link>https://www.greenhousedata.com/blog/beekeeper-patch-automation-powershell-validation-mneumonics-and-recovery-actions</link>
      <guid>https://www.greenhousedata.com/blog/beekeeper-patch-automation-powershell-validation-mneumonics-and-recovery-actions#When:21:07:00Z</guid>
      <description><![CDATA[<p>Beekeeper, our <a href="https://www.greenhousedata.com/software/beekeeper">proprietary patching automation tool</a>, can be integrated with Powershell scripts for customized&nbsp;patching validation and recovery options. Read on to learn how to insert mneuomics into your script to accomplish this as well as how to recover from failed patching when detected.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2020-01-03T21:07:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Anglin’ for Your Creds: Phishing via Social Media Connections ]]></title>
      <link>https://www.greenhousedata.com/blog/anglin-for-your-creds-phishing-social-media-connections</link>
      <guid>https://www.greenhousedata.com/blog/anglin-for-your-creds-phishing-social-media-connections#When:23:19:00Z</guid>
      <description><![CDATA[<p>This past week Green House Data employees found an invitation to connect in their LinkedIn inboxes from one Coleman Anglin, who claimed to be a Marketing Specialist at the company (unsurprisingly, no one in the marketing department received this invitation).&nbsp;</p>

<p>Of course the humorous last name of &#8220;Anglin&#8221; belies the true nature of this connection: phishing. While our security team was swift to send out a notice not to connect to this individual, the attempt highlights a growing trend of phishing attacks reaching beyond e-mail to the social media realm.</p>

<p>But why bother posing as a fellow employee or a friend on social media? Several employees asked what the threat could be from this seemingly innocuous connection, even if it was made in bad faith.&nbsp;</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2019-12-19T23:19:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Shift Left? Shift Right? Continuous Improvement Depends on Both ]]></title>
      <link>https://www.greenhousedata.com/blog/shift-left-shift-right-continuous-improvement-depends-on-both</link>
      <guid>https://www.greenhousedata.com/blog/shift-left-shift-right-continuous-improvement-depends-on-both#When:20:42:00Z</guid>
      <description><![CDATA[<p>As you dig into DevOps methodology, you&rsquo;re likely to encounter the term &ldquo;shift left&rdquo; and the slightly less common &ldquo;shift right.&rdquo; What exactly are we shifting here?</p>

<p>The two terms are sides of the same coin. They refer to when you will test your application or piece of technology &ndash; is it during development or once your solution has already entered production? Of course, for true DevOps success, the answer is both! Continuous improvement involves testing at all phases of the application lifecycle.</p>

<p>Let&rsquo;s take a closer look at the ideology behind &ldquo;shift left&rdquo; and its counterpart as well as how they affect the development cycle (which can also be applied beyond app development itself and used when designing and deploying most IT systems).</p>]]></description>
      <dc:subject><![CDATA[DevOps, Enterprise Applications, IT Operations,]]></dc:subject>
      <dc:date>2019-12-12T20:42:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The InfoSec Threat Lineup: Biggest Threats from 2019 ]]></title>
      <link>https://www.greenhousedata.com/blog/the-infosec-threat-lineup-biggest-threats-from-2019</link>
      <guid>https://www.greenhousedata.com/blog/the-infosec-threat-lineup-biggest-threats-from-2019#When:16:56:00Z</guid>
      <description><![CDATA[<p>As we approach year-end and look forward to future tech trends, we also reflect on the lessons learned over the past year. In the information security realm, things seem to stay the same even as they change.</p>

<p>Pervasive and persistent threats that are hardly new to the scene have made their way past small fry to take down some of the biggest service providers around. In many ways, 2019 proved the most effective threat vectors remain the most difficult to protect against, with the crucial attack point coming in the form of people &ndash; the hardest thing to control for within your organization.</p>

<p>There are some newer threats to consider as well, of course. Hackers never sleep!</p>

<p>Here&rsquo;s our lineup for the nastiest InfoSec baddies of 2019.</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2019-12-06T16:56:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What Are SysAdmins Thankful For? ]]></title>
      <link>https://www.greenhousedata.com/blog/what-are-sysadmins-thankful-for</link>
      <guid>https://www.greenhousedata.com/blog/what-are-sysadmins-thankful-for#When:19:46:00Z</guid>
      <description><![CDATA[<p>It&rsquo;s Thanksgiving week here in the United States, and while we&rsquo;re all thankful for the usual suspects like our families, homes, health, and employment, there are some special things that technical workers are extra glad to have in the workplace.</p>

<p>Here are our Top 10 Things SysAdmins Are Thankful For in 2019:</p>]]></description>
      <dc:subject><![CDATA[]]></dc:subject>
      <dc:date>2019-11-26T19:46:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Where Is Enterprise IT Heading in 2020? Lessons from Gartner IT Symposium ]]></title>
      <link>https://www.greenhousedata.com/blog/where-is-enterprise-it-heading-in-2020-lessons-from-gartner-it-symposium</link>
      <guid>https://www.greenhousedata.com/blog/where-is-enterprise-it-heading-in-2020-lessons-from-gartner-it-symposium#When:17:06:00Z</guid>
      <description><![CDATA[<p>It&rsquo;s been over a month since I attended the Gartner IT Symposium/Xpo in Orlando and I&rsquo;ve spent that time really chewing on some of the great sessions and thought leadership presented at the show. Modern IT practices remain a moving target so plugging into the analyst machine every once in a while helps me get a bigger picture beyond even our day to day at Green House Data (which can be pretty diverse itself, with big pushes on DevOps and digital transformation while we balance our existing data center, cloud, and managed services pillars).</p>

<p>It was interesting hearing Gartner start to shift their message from &#8220;cloud is the only option&#8221; to &#8220;cloud is an option.&#8221; As cloud adoption strategies have matured we have seen this attitude shift as well, with more organizations looking multi-cloud while maintaining some on-prem systems. One presentation on public cloud costs compared to on-prem data centers&nbsp;really helped drive this home. The bottom line is that the cloud is not automatically cheaper or even necessarily more efficient depending on the application or purpose of the deployment.</p>

<p>Other major topics included how to find digital talent, as the management of human capital and IT teams continues to evolve alongside the industry, as well as one of my favorite presentations, &ldquo;Are You Maximizing Your Security Operations Center,&rdquo; which had a ton of great information around security.</p>

<p>With the symposium still fresh in mind, here is my list of where enterprise IT operations are heading in 2020 and beyond.</p>]]></description>
      <dc:subject><![CDATA[Multi-Cloud, IT Modernization, IT Operations, Security,]]></dc:subject>
      <dc:date>2019-11-22T17:06:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Our Biggest Takeaways from Microsoft Ignite 2019 ]]></title>
      <link>https://www.greenhousedata.com/blog/our-biggest-takeaways-from-microsoft-ignite-2019</link>
      <guid>https://www.greenhousedata.com/blog/our-biggest-takeaways-from-microsoft-ignite-2019#When:18:18:00Z</guid>
      <description><![CDATA[<p>Green House Data was onsite last week at Microsoft Ignite. We had some incredible conversations at our booth about Azure, PowerApps, application modernization, DevOps, Windows Server end of support, and more. Of course, while we were working the floor, Microsoft made a bevy of product announcements around core products and services that are sure to shake up your IT world! I&rsquo;m super excited about these new developments, so here are my top takeaways from the show.</p>]]></description>
      <dc:subject><![CDATA[Azure, SCOM, SCCM, DevOps, Enterprise Applications, Hybrid IT, IT Modernization, IT Operations, Microsoft, Software Development,]]></dc:subject>
      <dc:date>2019-11-13T18:18:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Step-by-Step Planning for Data Migration ]]></title>
      <link>https://www.greenhousedata.com/blog/step-by-step-planning-for-data-migration</link>
      <guid>https://www.greenhousedata.com/blog/step-by-step-planning-for-data-migration#When:20:35:00Z</guid>
      <description><![CDATA[<p>Data migration takes many forms, including moving data between storage locations or mediums, changing the format of the data, and sharing or importing data between applications. It&rsquo;s required when retiring a legacy system, introducing new apps or services, migrating to the cloud, or consolidating your data center.</p>

<p>Data storage can be a complicated beast thanks to the myriad ways data grows and integrates with various components of your IT infrastructure. A secondary goal of any data migration project should therefore be data management itself, reducing complexities introduced by application logic, customization, governance, and other entanglements.</p>

<p>Regardless of the destination of your data or the business drivers behind the migration, you&rsquo;ll need to extract your data, modify it, and perform the actual data transfer. Detailed planning and risk evaluation are key before proceeding, especially as you are likely to handle some sensitive information.</p>]]></description>
      <dc:subject><![CDATA[Migration, Cloud Storage,]]></dc:subject>
      <dc:date>2019-10-31T20:35:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Staying on Top of IT Cost Optimization ]]></title>
      <link>https://www.greenhousedata.com/blog/staying-on-top-of-it-cost-optimization</link>
      <guid>https://www.greenhousedata.com/blog/staying-on-top-of-it-cost-optimization#When:22:43:00Z</guid>
      <description><![CDATA[<p>It happens to everyone at some point. Your budget gets slashed; the economy tanks; you&rsquo;re suddenly in the red thanks to cloud sprawl. Whatever the cause, you&rsquo;ll likely face a mandatory cost cutting initiative at some point in your IT career.</p>

<p>While cost cutting is a reality, it is fundamentally different from ongoing cost optimization. You should be practicing cost optimization as part of your regular duties, reviewing spend and ensuring the technology, hardware, software, and services in use across your organization are serving their business need and appropriately configured in scope and performance.</p>

<p>By formulating and practicing a cost optimization protocol, you&rsquo;ll be prepared should the day for cost cutting ever come, while also gathering evidence for the impact IT has on the overall bottom line.</p>]]></description>
      <dc:subject><![CDATA[IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2019-10-24T22:43:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Information Security is Everyone’s Problem…and That’s a Problem ]]></title>
      <link>https://www.greenhousedata.com/blog/information-security-is-everyones-problem-thats-a-problem</link>
      <guid>https://www.greenhousedata.com/blog/information-security-is-everyones-problem-thats-a-problem#When:22:46:00Z</guid>
      <description><![CDATA[<p>If your organization is large enough to have an information security manager or an entire security team, then it&rsquo;s likely that any security issue or task will be pushed in their direction. That&rsquo;s why you hired them, isn&rsquo;t it?</p>

<p>Security is a specialized area of IT and it requires specific skills for a holistic approach. It is also a moving target with many components and attack vectors across your technology stack. A dedicated security team or individual, whether in-house or contracted, can therefore be valuable. But security must be a shared responsibility among <em>every</em> user, no matter their role.</p>

<p>There&rsquo;s an inherent problem here and its name is Diffusion of Responsibility. When everyone has a stake in security and there are dedicated managers to boot, users could be more likely to engage in risky behavior. After all, it&rsquo;s taken care of! That&rsquo;s why we hired that security guy.</p>]]></description>
      <dc:subject><![CDATA[IT Operations, Security,]]></dc:subject>
      <dc:date>2019-10-17T22:46:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What is DataOps? Roles, Strategies, and Differences from DevOps ]]></title>
      <link>https://www.greenhousedata.com/blog/what-is-dataops-roles-strategies-and-differences-from-devops</link>
      <guid>https://www.greenhousedata.com/blog/what-is-dataops-roles-strategies-and-differences-from-devops#When:20:53:00Z</guid>
      <description><![CDATA[<p>It might feel like DevOps is eating the world, but there&rsquo;s still room for other innovations within and adjacent to IT operations. One such example is the DataOps movement. The general inspiration behind DataOps is similar to DevOps in that is strives to provide higher quality deliverables from shorter cycles by leveraging technology and specific methodologies around it.</p>

<p>DataOps does not boil down to DevOps principles applied to data analytics, however. While both approaches may embrace automation, continuous improvement, and strong communication between departments, DataOps is less of an infinite cycle and more of an injection of agility into a one-way data pipeline.</p>

<p>Let&rsquo;s explore the roles, strategies, and technologies at play in a DataOps approach to analytics.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Modernization, IT Operations, Data &amp; Analytics,]]></dc:subject>
      <dc:date>2019-10-10T20:53:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Azure Governance: Defining Your Organizational Hierarchy ]]></title>
      <link>https://www.greenhousedata.com/blog/azure-governance-defining-your-organizational-hierarchy</link>
      <guid>https://www.greenhousedata.com/blog/azure-governance-defining-your-organizational-hierarchy#When:21:55:00Z</guid>
      <description><![CDATA[<p>A fundamental building block for your successful adoption of cloud services is the organizational hierarchy, a mode of organizing your cloud services, resources, and virtual machines in such a way that you ensure cloud governance and can better resolve billing within your organization.</p>

<p>Cloud governance is the answer to common questions like:</p>

<p>&bull; &ldquo;How do I keep my data compliant with industry regulations?&rdquo;</p>

<p>&bull; &ldquo;How can I implement chargeback within my organization so I know which departments are consuming cloud services and account for that usage?&rdquo;</p>

<p>&bull; &ldquo;How can I mandate security and access measures across our cloud environment?&rdquo;</p>

<p>By implementing a flexible set of controls and overall organizational hierarchy within Azure, you can enable adoption of the cloud services your business units require and avoid shadow cloud use. A well-designed enterprise cloud environment can accommodate modern agile practices alongside traditional workloads.</p>

<p>Here&rsquo;s how to structure your organizational hierarchy within Azure so you can set governance requirements and encourage speed of delivery for your individual departments and business units.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, DevOps, IT Operations, Microsoft,]]></dc:subject>
      <dc:date>2019-10-02T21:55:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Managing VMs Before and After Patching with Beekeeper Patch Automation Software ]]></title>
      <link>https://www.greenhousedata.com/blog/managing-vms-before-and-after-patching-with-beekeeper-patch-automation-software</link>
      <guid>https://www.greenhousedata.com/blog/managing-vms-before-and-after-patching-with-beekeeper-patch-automation-software#When:16:01:00Z</guid>
      <description><![CDATA[<p>Whether you use&nbsp;Microsoft Hyper-V&nbsp;or VMware vSphere as your hypervisor, <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper patching automation</a> can help manage the VMs before and after patching. VM validations include:</p>

<ul>
<li>Starting VMs</li>
<li>Taking snapshots or checkpoints</li>
<li>Reverting to snapshots or checkpoints</li>
<li>Merging snapshots or checkpoints</li>
<li>Cloning or exporting VMs</li>
<li>Shutting down VMs</li>
<li>Live migrating&nbsp;&nbsp;VMs when patching the Hyper-V host</li>
</ul>

<p>You can add these validations to your patching process&nbsp;so you are automatically covered when it comes to compliance and VM configuration even after applying patches. Automating these processes is Beekeeper&#39;s specialty.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-09-30T16:01:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ When It Comes to Application Security Testing, Should You Go Dynamic or Static? ]]></title>
      <link>https://www.greenhousedata.com/blog/when-it-comes-to-application-security-testing-should-you-go-dynamic-or-static</link>
      <guid>https://www.greenhousedata.com/blog/when-it-comes-to-application-security-testing-should-you-go-dynamic-or-static#When:22:10:00Z</guid>
      <description><![CDATA[<p>There are two main categories of application security testing: dynamic and static. They can be thought of as testing from the outside-in and from the inside-out, respectively.</p>

<p>Dynamic testing is performed as an application is running and focuses on simulating how an outside attacker might access that application and associated systems. Static testing, on the other hand, examines the code itself and related documentation, often throughout the actual development process, to try and discover potential vulnerabilities before the application reaches production.</p>

<p>Should you use DAST or SAST for your applications? In truth it is not an either/or situation, as DAST and SAST are complementary and evolved indivually. First let&#39;s take a look at the key differences between them.</p>]]></description>
      <dc:subject><![CDATA[Patching, DevOps, Security,]]></dc:subject>
      <dc:date>2019-09-26T22:10:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Agile Scrum in DevOps Ecosystems, Part Two ]]></title>
      <link>https://www.greenhousedata.com/blog/agile-scrum-in-devops-ecosystems-part-two</link>
      <guid>https://www.greenhousedata.com/blog/agile-scrum-in-devops-ecosystems-part-two#When:08:00:00Z</guid>
      <description><![CDATA[<p>Last week <a href="https://www.greenhousedata.com/blog/agile-scrum-in-devops-ecosystems-part-one">I introduced key agile concepts including the history of and essential roles required for Scrum practices</a>. I described a real-world example of how DevOps could have saved my organization major headaches and expenses.</p>

<p>In Part Two of this post on using agile Scrum methodology within DevOps ecosystems, we&#39;ll examine the Four Values of Agile and learn how to change your organizational mindset to accommodate this new paradigm.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Modernization, IT Operations, Software Development,]]></dc:subject>
      <dc:date>2019-09-17T08:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Agile Scrum in DevOps Ecosystems, Part One ]]></title>
      <link>https://www.greenhousedata.com/blog/agile-scrum-in-devops-ecosystems-part-one</link>
      <guid>https://www.greenhousedata.com/blog/agile-scrum-in-devops-ecosystems-part-one#When:17:25:00Z</guid>
      <description><![CDATA[<p>In early 2001 I was involved in a software development project on integrating bolt-on application to a JD Edwards ERP software platform. The team completed the initial requirements collection and developed a comprehensive Business Requirement Document (BRD), investing roughly two to three months. The team had multiple review sessions to identify gaps in the requirements process and after a few cycles received approvals to proceed to the development phase.</p>

<p>While development was in progress, some of the EDI-based vendor data sources changed the mapping. This situation created chaos in the project. The management team decided to hold off the development phase. The project had to go through the requirements cycle again to identify the gaps. This situation impacted the schedule and budget, creating massive frustration in the organization. The first six months of the project investment was on hold. The sequential software development process we followed did not allow the flexibility to deliver any incremental value to the organization since the beginning of the project.</p>

<p>If we had followed an agile approach, this challenging outcome might have resolved in a different manner. The short intervals of development would have produced incremental value to the organization. Therefore we would have minimized the organizational concerns of not providing any value for six long months.</p>

<p>Here&#39;s how agile practices, Scrum, and DevOps all work together. Learn how to overcome adoption obstacles and several keys to Scrum success in this two-part blog series.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Modernization, IT Operations, Software Development,]]></dc:subject>
      <dc:date>2019-09-11T17:25:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Checking the Progress of Beekeeper Execution Jobs ]]></title>
      <link>https://www.greenhousedata.com/blog/checking-the-progress-of-beekeeper-execution-jobs</link>
      <guid>https://www.greenhousedata.com/blog/checking-the-progress-of-beekeeper-execution-jobs#When:08:04:00Z</guid>
      <description><![CDATA[<p>We have received requests to see more detail around what is happening while <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper </a>applies patches for devices.&nbsp; We have built a PowerShell script to query Beekeeper and the patched devices to display what is going on within Beekeeper and show the progress on individual patches.</p>

<p>To execute the script, you can run it on the Beekeeper server. Learn how below.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-09-02T08:04:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Ransomware Attacks Ramp Up on State and Local Governments ]]></title>
      <link>https://www.greenhousedata.com/blog/ransomware-attacks-ramp-up-on-state-and-local-governments</link>
      <guid>https://www.greenhousedata.com/blog/ransomware-attacks-ramp-up-on-state-and-local-governments#When:08:00:00Z</guid>
      <description><![CDATA[<p>Ransomware is a digital attack in which an executable or malicious link opened by an unsuspecting (and likely untrained) user installs a program that blocks access to applications, phone systems, and/or data until a ransom is paid. It&rsquo;s been making the rounds for many years now. But only lately have hackers begun zeroing in on a specific vertical: state and local governments.</p>

<p>In 2019, over 22 governments have been affected by ransomware &ndash; and that number was prior to recent news breaking that an additional 22 small towns in Texas were all targeted in a single coordinated attack.</p>

<p>Over 200 state, county, or city government IT systems have been targeted in recent years. With thousands and thousands of cities and towns across America, that may seem like a drop in the bucket. But ransomware is becoming easier and easier to distribute and users continue fall victim; usually via phishing emails or web exploits that deliver malware without any user action outside of visiting an apparently innocuous site.</p>

<p>Why are governments becoming a preferred target for ransomware? And how can you improve your chances of avoiding or mitigating ransomware?</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2019-08-28T08:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The InfoSec Student Part 3: A Focus on the Fundamentals ]]></title>
      <link>https://www.greenhousedata.com/blog/the-infosec-student-part-3-a-focus-on-the-fundamentals</link>
      <guid>https://www.greenhousedata.com/blog/the-infosec-student-part-3-a-focus-on-the-fundamentals#When:17:25:00Z</guid>
      <description><![CDATA[<p>In InfoSec we continually encounter the&nbsp;unknown, the unfamiliar.&nbsp;Technology marches ever forward, application design matures, bells and whistles chime and toot.&nbsp;This commonly results in the InfoSec professional needing to responsibly secure technology that they don&rsquo;t holistically understand.&nbsp;Attackers&nbsp;know this, for it is within those gaps in understanding that malicious activity may most readily&nbsp;occur and&nbsp;may&nbsp;do so&nbsp;without&nbsp;notice.&nbsp;&nbsp;</p>

<p>A&nbsp;common&nbsp;InfoSec&nbsp;response to the unfamiliar is&nbsp;to&nbsp;attempt to cover all potential angles of attack,&nbsp;regardless of whether they are&nbsp;pertinent&nbsp;to the technology. This is done in&nbsp;order to ensure that we meet both risk and governance management&nbsp;goals.&nbsp;The result of this&nbsp;approach&nbsp;is&nbsp;rarely&nbsp;better security. Rather, it&nbsp;typically results in&nbsp;unnecessarily&nbsp;complicated security&nbsp;control&nbsp;implementations that are&nbsp;neither&nbsp;functional (e.g.,&nbsp;they don&rsquo;t&nbsp;do what we&nbsp;want/expect&nbsp;them to do)&nbsp;nor operational&nbsp;(e.g., our personnel can&rsquo;t adequately manage them).&nbsp;</p>

<p>How do we avoid over-complication in our security controls? We focus on the fundamentals: Preparation, Awareness, Response.&nbsp;</p>]]></description>
      <dc:subject><![CDATA[IT Operations, Security,]]></dc:subject>
      <dc:date>2019-08-22T17:25:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Top Priorities for Securing Office 365 ]]></title>
      <link>https://www.greenhousedata.com/blog/top-priorities-for-securing-office-365</link>
      <guid>https://www.greenhousedata.com/blog/top-priorities-for-securing-office-365#When:21:27:00Z</guid>
      <description><![CDATA[<p>Migrating e-mail and productivity apps to the cloud is a no brainer. Continuous updates, access from anywhere, no need to manage the supporting servers and associated hardware&hellip;the benefits are clear. As with any IT outsourcing, however, careful planning around security measures is essential. And with your O365 environment exposed to the public internet, security best practices are even more important.</p>

<p>While securing Office 365 is an ongoing effort, there are several top priorities that should be first to be addressed after your migration.</p>]]></description>
      <dc:subject><![CDATA[O365, Security,]]></dc:subject>
      <dc:date>2019-08-14T21:27:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Five Key Questions to Control Cloud Costs ]]></title>
      <link>https://www.greenhousedata.com/blog/five-key-questions-to-control-cloud-costs</link>
      <guid>https://www.greenhousedata.com/blog/five-key-questions-to-control-cloud-costs#When:21:10:00Z</guid>
      <description><![CDATA[<p>With some organizations <a href="https://www.greenhousedata.com/blog/cloud-repatriation-when-is-it-time-to-bring-workloads-back-on-prem">looking to move cloud workloads back on-premises</a> to mitigate costs and regain control over their hardware and audit trails, you might be questioning cloud-first and cloud-only initiatives for infrastructure procurement.</p>

<p>After all, for years marketing pushed lower overall costs after migrating to the cloud. So what gives? Why are many cloud workloads ending up more expensive than their on-prem counterparts?</p>

<p>You&#39;ve probably heard the old joke before that the cloud is &#8220;just someone else&#39;s data center.&#8221; That may have been true a decade ago, but no longer.</p>

<p>Forcing a cloud migration is not the key to savings. You must understand the business value, catalog and think deeply about the existing and desired state of your infrastructure, rearchitect your workloads, and adjust your workflow to this new paradigm. Here are the five key areas you need to plan things out.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, IT Modernization,]]></dc:subject>
      <dc:date>2019-08-09T21:10:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The Other IaaS: Insights as a Service ]]></title>
      <link>https://www.greenhousedata.com/blog/the-other-iaas-insights-as-a-service</link>
      <guid>https://www.greenhousedata.com/blog/the-other-iaas-insights-as-a-service#When:18:30:00Z</guid>
      <description><![CDATA[<p>As you continue to adopt cloud technologies and pursue digital transformation, you&rsquo;ll overhaul databases, migrate data to the cloud, and continue to connect more and more information gathering tools to your digital environment.</p>

<p>With unstructured data pooling rapidly in cloud object storage and structured data overwhelming your databases, you&rsquo;ll wisely implement data management protocols that include long term archiving, encryption and security measures for sensitive data, and strategic use of various cloud and on premises storage methods to minimize costs.</p>

<p>But are you taking advantage of that data beyond how it used in the applications that gather and handle it? There are business insights to be gleaned and platforms like Power BI can help you make sense of it. If you don&rsquo;t have time to learn a new platform or budget to hire a full time data analytics staff, you can instead find an Insights as a Service provider to help.</p>]]></description>
      <dc:subject><![CDATA[IT Modernization,]]></dc:subject>
      <dc:date>2019-08-01T18:30:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Before Going Serverless, Be Aware of Limitations ]]></title>
      <link>https://www.greenhousedata.com/blog/before-going-serverless-be-aware-of-limitations</link>
      <guid>https://www.greenhousedata.com/blog/before-going-serverless-be-aware-of-limitations#When:21:40:00Z</guid>
      <description><![CDATA[<p>Serverless functions (often referred to as Functions as a Service or FaaS) will no doubt continue to grow in popularity and remain a cornerstone of IT services for many years to come. However, they are simply another way of building, maintaining, and delivering IT systems. With that in mind, they naturally have disadvantages or situations in which they may not be the preferred technology to use. These are due both to the nature of serverless and how it is currently implemented by cloud service providers.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, DevOps, IT Modernization,]]></dc:subject>
      <dc:date>2019-07-25T21:40:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Beekeeper Patch Automation: Checking Exchange DAG Health Before a Patch Cycle ]]></title>
      <link>https://www.greenhousedata.com/blog/beekeeper-patch-automation-checking-exchange-dag-health-before-a-patch-cycle</link>
      <guid>https://www.greenhousedata.com/blog/beekeeper-patch-automation-checking-exchange-dag-health-before-a-patch-cycle#When:22:39:00Z</guid>
      <description><![CDATA[<p>Before using <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper for your patching cycle</a> for&nbsp;Exchange DAGs, you should make sure the servers are healthy and ready to be patched.&nbsp; We have developed a script to assist you.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-07-22T22:39:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Pursuing Digital Transformation? Don’t Forget About Security ]]></title>
      <link>https://www.greenhousedata.com/blog/pursuing-digital-transformation-dont-forget-about-security</link>
      <guid>https://www.greenhousedata.com/blog/pursuing-digital-transformation-dont-forget-about-security#When:22:02:00Z</guid>
      <description><![CDATA[<p>Digital transformation may be a bit of a catch all for adopting modern IT principles and technologies, from cloud platforms and services to mobility and big data to DevOps practices, but it is a real movement throughout the business realm.</p>

<p>The primary gist is to not only introduce new tech, but to also take a close look at the business processes and organizational units behind them to ensure that innovation can occur, and the bottom line is improved. In other words, technology for the sake of technology won&rsquo;t solve any business problems. You must transform your entire organization with a combination of technology and process.</p>

<p>True digital transformation involves your entire organization and results in the integration of various systems and operations across the business. If that sounds like a major undertaking, it is.</p>

<p>It also comes with a slew of information security concerns that should not be overlooked in the rush to the cloud.</p>]]></description>
      <dc:subject><![CDATA[IT Modernization, Security,]]></dc:subject>
      <dc:date>2019-07-18T22:02:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Azure Functions and Logic Apps: Differences and When to Use Them ]]></title>
      <link>https://www.greenhousedata.com/blog/azure-functions-and-logic-apps-differences-and-when-to-use-them</link>
      <guid>https://www.greenhousedata.com/blog/azure-functions-and-logic-apps-differences-and-when-to-use-them#When:17:37:00Z</guid>
      <description><![CDATA[<p>Microsoft Azure offers native serverless computing features. Two of the most crucial to master are Azure Functions and Azure Logic Apps. Each of them help enable business logic that automates your Azure workflow, but they have key differences and in fact can be used together in a complementary manner to offer flexible, powerful control over your cloud resources.</p>

<p>Let&rsquo;s take a closer look at how each of these serverless automation platforms work within Azure and some use cases for them.</p>]]></description>
      <dc:subject><![CDATA[Azure, Datacenter Automation, Cloud Hosting, DevOps, IT Operations, Microsoft,]]></dc:subject>
      <dc:date>2019-07-10T17:37:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Integration as a Service Connects Your Apps to the Cloud ]]></title>
      <link>https://www.greenhousedata.com/blog/integration-as-a-service-connects-your-apps-to-the-cloud</link>
      <guid>https://www.greenhousedata.com/blog/integration-as-a-service-connects-your-apps-to-the-cloud#When:23:22:00Z</guid>
      <description><![CDATA[<p>Hybrid cloud management spans beyond setting up your IaaS environment. The majority of enterprises use a mix of on premises infrastructure (both legacy and newly deployed) and cloud-based resources. Often a major hurdle remains: applications that are not ready to connect to the cloud.</p>

<p>Enter Integration as a Service. We know, we know. Everything as a Service overload! This emerging field involves a vendor who can help architect enterprise IT apps to work across on premises and cloud environments, complete with real-time exchange of data.</p>

<p>How does Integration-a-a-S work and what should you expect from a cloud integration provider?</p>]]></description>
      <dc:subject><![CDATA[Managed Services, Multi-Cloud, Cloud Hosting, DevOps, Enterprise Applications, IT Operations, Software Development,]]></dc:subject>
      <dc:date>2019-07-03T23:22:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The Infosec Student Part 2: DevOps is the Answer to Engagement Sprawl ]]></title>
      <link>https://www.greenhousedata.com/blog/the-infosec-student-part-2-devops-is-the-answer-to-engagement-sprawl</link>
      <guid>https://www.greenhousedata.com/blog/the-infosec-student-part-2-devops-is-the-answer-to-engagement-sprawl#When:16:33:00Z</guid>
      <description><![CDATA[<p>If you&rsquo;ve <a href="https://www.greenhousedata.com/blog/infosec-roles-and-archetypes-to-close-the-skills-gap">newly set foot on the path of&nbsp;an InfoSec&nbsp;student</a>,&nbsp;you will benefit from understanding this topic. If you&rsquo;ve been around awhile, you&rsquo;ve lived it.&nbsp;&nbsp;</p>

<p>There are two basic types of&nbsp;Information Security&nbsp;engagements&nbsp;in terms of how they are&nbsp;scoped. This is most applicable to managed services providers (MSPs), though&nbsp;it remains relevant to a&nbsp;practitioner&nbsp;supporting an internal corporate&nbsp;or public sector&nbsp;security team.&nbsp;For the sake of simplicity, I&rsquo;m going to call them FFP and T&amp;M.&nbsp;The purpose of this blog isn&rsquo;t to dig deep into financial models, but rather to discuss, in a simplified manner, how they drive&nbsp;the delivery of work. And then, to discuss an alternative model.&nbsp;&nbsp;</p>

<p>With both&nbsp;Fixed Firm Price and Time &amp; Materials engagements&nbsp;&ndash; and really any other model of InfoSec contract scope&nbsp;&ndash;&nbsp;there are some overlapping goals and realities.&nbsp;</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Operations, Security,]]></dc:subject>
      <dc:date>2019-06-28T16:33:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What&#8217;s a Jumpbox or Bastion Host, Anyway? ]]></title>
      <link>https://www.greenhousedata.com/blog/whats-a-jumpbox-or-bastion-host-anyway</link>
      <guid>https://www.greenhousedata.com/blog/whats-a-jumpbox-or-bastion-host-anyway#When:22:37:00Z</guid>
      <description><![CDATA[<p>Microsoft recently revealed a service called Azure Bastion that allows customers a more secure way to connect and access virtual machines (VMs). It uses Remote Desktop Protocol (RDP) and Secure Shell (SSH) network protocol alongside Secure Sockets Layer (SSL) encryption.</p>

<p>Bastion connects VMs, your local computers, and cloud resources without exposing them to public network connections. As a Platform as a Service, it simplifies the process of setting up and administrating bastion hosts or jumpboxes in your cloud environment.</p>

<p>But what are bastion hosts or jumpboxes? And why would you use them, or a service like Azure Bastion?</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, Microsoft, Networking and Fiber, Security,]]></dc:subject>
      <dc:date>2019-06-20T22:37:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Multi-Cloud Survey: 72% Using Multiple Cloud Providers, But 56% Have No Multi-Cloud Strategy ]]></title>
      <link>https://www.greenhousedata.com/blog/multi-cloud-survey-72-using-multiple-cloud-providers-but-56-have-no-multi-cloud-strategy</link>
      <guid>https://www.greenhousedata.com/blog/multi-cloud-survey-72-using-multiple-cloud-providers-but-56-have-no-multi-cloud-strategy#When:21:27:00Z</guid>
      <description><![CDATA[<p>We recently launched a survey of IT professionals to see how multi-cloud adoption is progressing among members of the community. While we packaged it as a fun quiz to &ldquo;Learn Your Cloud Animal&rdquo; based on what results were chosen, the results offer some great insight.</p>

<p>Most crucially, we discovered that while 72% of respondents were currently using multiple cloud providers, a whopping 56% of them had no multi-cloud strategy or long-term roadmap.</p>

<p>We dug in deeper to learn how these IT pros were using external service providers to manage multi-cloud workloads, whether they were using multi-cloud management tools, if containers entered the equation, and much more.</p>

<p>Read on to learn the rest, including the top challenges faced in a multi-cloud environment.</p>]]></description>
      <dc:subject><![CDATA[Multi-Cloud, Cloud Hosting, Hybrid IT,]]></dc:subject>
      <dc:date>2019-06-14T21:27:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ End of Support for SQL Server and Windows Server 2008: Should You Migrate to the Cloud? ]]></title>
      <link>https://www.greenhousedata.com/blog/end-of-support-for-sql-server-and-windows-2008-should-you-migrate-to-the-cloud</link>
      <guid>https://www.greenhousedata.com/blog/end-of-support-for-sql-server-and-windows-2008-should-you-migrate-to-the-cloud#When:21:39:00Z</guid>
      <description><![CDATA[<p>You would be woefully uninformed and unprepared as an IT admin if you didn&rsquo;t know that two major Microsoft products, the 2008 versions of SQL Server and Windows Server, are each about to reach their end of support. That means it&rsquo;s time to upgrade or migrate lest you fall victim to inevitable security vulnerabilities.</p>

<p>One big question when facing a major software upgrade such as this is whether to remain in place, so to speak, and update to the latest version from your current deployment scenario on premise or in a hosted environment, or to move to a cloud-based server &ndash; namely Azure, since that offers you tight integration and lower costs with Microsoft products such as these.</p>

<p>SQL Server end of support is imminent, coming up on July 9, 2019. Windows Server has a few months to go, ending support on January 14, 2020.</p>]]></description>
      <dc:subject><![CDATA[Active Directory, Cloud Hosting, IT Modernization, Microsoft, Security,]]></dc:subject>
      <dc:date>2019-06-06T21:39:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Linking Patch Validation Tasks in Beekeeper ]]></title>
      <link>https://www.greenhousedata.com/blog/linking-patch-validation-tasks-in-beekeeper</link>
      <guid>https://www.greenhousedata.com/blog/linking-patch-validation-tasks-in-beekeeper#When:20:41:00Z</guid>
      <description><![CDATA[<p>We return to our ongoing series on <a href="https://www.greenhousedata.com/software/beekeeper">Beekeeper patching automation software</a> penned by Beekeeper Product Manager John Hann. This entry describes how to link validation tasks to your various Application Groups, Failover Clusters, and Exchange DAGs.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-06-03T20:41:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Office 365 vs. Microsoft 365: Which Is Right for Your Business? ]]></title>
      <link>https://www.greenhousedata.com/blog/office-365-vs-microsoft-365-which-is-right-for-your-business</link>
      <guid>https://www.greenhousedata.com/blog/office-365-vs-microsoft-365-which-is-right-for-your-business#When:21:06:00Z</guid>
      <description><![CDATA[<p>As you research your options for enterprise productivity applications you likely will come across Microsoft 365 alongside the more commonly known Office 365.</p>

<p>In typical Microsoft fashion, there are an array of different plans and licensing levels for each option. Deciding which is the best option can therefore take some time.</p>

<p>What is Microsoft 365 and how is it different from Office 365? M365 includes enterprise-specific features that you would likely purchase separately, critically several Enterprise Mobility and Security components.</p>

<p>For businesses at the midsize and enterprise levels, M365 seems like the clear choice. But what exactly do you get at each level of M365? And how does it compare to O365?</p>]]></description>
      <dc:subject><![CDATA[Azure, Active Directory, Windows 10, O365, IT Modernization, Microsoft,]]></dc:subject>
      <dc:date>2019-05-29T21:06:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Agile Methodology for Cloud Administration is Like Peanut Butter and Jelly ]]></title>
      <link>https://www.greenhousedata.com/blog/agile-methodology-for-cloud-administration-is-like-peanut-butter-and-jelly</link>
      <guid>https://www.greenhousedata.com/blog/agile-methodology-for-cloud-administration-is-like-peanut-butter-and-jelly#When:22:33:00Z</guid>
      <description><![CDATA[<p>DevOps &mdash; the marriage of the development and operations departments within a software organization &mdash; and Agile methodology have been mentioned alongside cloud computing for years now, and with good reason. Using Agile in the cloud is a classic pairing that goes together like peanut butter and jelly or macaroni and cheese&hellip;okay, let me go grab a snack before this simile gets me drooling.</p>

<p>But seriously, even if Agile and cloud technology aren&rsquo;t as tasty as PB&amp;J, they can still have you smacking your lips in satisfaction as you react to business problems with technology solutions in a much faster and more reliable manner.</p>

<p>Here&rsquo;s why Agile software development practices work so well when you&rsquo;re working with cloud infrastructure, even if you aren&rsquo;t a software development company.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, DevOps, Enterprise Applications, IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2019-05-23T22:33:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Three DevOps Pitfalls to Avoid ]]></title>
      <link>https://www.greenhousedata.com/blog/three-devops-pitfalls-to-avoid</link>
      <guid>https://www.greenhousedata.com/blog/three-devops-pitfalls-to-avoid#When:22:13:00Z</guid>
      <description><![CDATA[<p>As you transition towards CloudOps, DevOps, DevSecOps, and general continual iteration and continuous improvement type IT management strategies, there are a number of common mistakes you&rsquo;ll want to avoid.</p>

<p>DevOps at all costs is not going to provide any additional business value. Nor is it likely to be great for your IT team morale. Make sure you keep in mind these three common DevOps pitfalls as you evangelize and adopt DevOps practices throughout your IT department or larger organization.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Modernization, IT Operations, Software Development,]]></dc:subject>
      <dc:date>2019-05-15T22:13:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The InfoSec Student Part 1: InfoSec Roles and Archetypes to Close the Skills Gap ]]></title>
      <link>https://www.greenhousedata.com/blog/infosec-roles-and-archetypes-to-close-the-skills-gap</link>
      <guid>https://www.greenhousedata.com/blog/infosec-roles-and-archetypes-to-close-the-skills-gap#When:22:08:00Z</guid>
      <description><![CDATA[<p>It is generally understood, with broad industry concurrence, that an InfoSec skills gap exists and presents a significant challenge for those of us responsible for managing risk within an organization.&nbsp;To close the skills gap, an organization must first understand the competencies required by security teams in their pursuit of information technology risk management.</p>

<p>Information security consists of three core archetypes: <strong>builders</strong>, <strong>breakers</strong>, and <strong>defenders</strong>. It is through recruiting and building the skills of these archetypes that the foundations of highly functional security teams are formed.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Operations, Security,]]></dc:subject>
      <dc:date>2019-05-07T22:08:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Cloud Repatriation: When Is it Time to Bring Workloads Back On-Prem? ]]></title>
      <link>https://www.greenhousedata.com/blog/cloud-repatriation-when-is-it-time-to-bring-workloads-back-on-prem</link>
      <guid>https://www.greenhousedata.com/blog/cloud-repatriation-when-is-it-time-to-bring-workloads-back-on-prem#When:21:13:00Z</guid>
      <description><![CDATA[<p>It feels like we&rsquo;ve been talking &ldquo;cloud-first&rdquo; or &ldquo;cloud-only&rdquo; when it comes to IT transformation and new procurement strategies for years now. But <a href="https://www.greenhousedata.com/blog/are-enterprises-shifting-back-to-on-premise-hardware">a little over a year ago</a>, we already saw some signs of what analysts are now calling <strong>cloud repatriation</strong>. At the time we asked, are enterprises moving back to on-premise data centers?</p>

<p>The answer isn&rsquo;t that simple, but there is certainly a time and place for cloud repatriation. Here&rsquo;s why it&rsquo;s trendy to move some workloads back on premise and how to decide whether its time for you to follow suit.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Colocation, Hybrid IT,]]></dc:subject>
      <dc:date>2019-04-25T21:13:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Defining Your Enterprise Monitoring Strategy: Close the Gaps with SCOM 2019 and Azure Monitor ]]></title>
      <link>https://www.greenhousedata.com/blog/defining-your-enterprise-monitoring-strategy-close-the-gaps-with-scom-2019-and-azure-monitor</link>
      <guid>https://www.greenhousedata.com/blog/defining-your-enterprise-monitoring-strategy-close-the-gaps-with-scom-2019-and-azure-monitor#When:16:14:00Z</guid>
      <description><![CDATA[<p>When using Microsoft technologies in your enterprise IT stack, you have a few native options for systems monitoring and alerts. Two recent product developments &mdash; folding Operations Management Suite (OMS) functionality into Azure Monitor, as well as the release of the new SCOM 2019 &mdash; have reignited the debate to determine whether Azure Monitor can entirely replace the long standing, good-old SCOM (System Center Operations Manager).</p>

<p>In a way, I feel this comparison is a bit unfair, like comparing apples with oranges. Ultimately the two products can work together and overlap in order to eliminate monitoring gaps in your environment. So which monitoring solution would work the best for your enterprise? Let&rsquo;s try to figure out!</p>]]></description>
      <dc:subject><![CDATA[Azure, SCOM, Datacenter Automation, Cloud Hosting, Enterprise Applications, IT Operations, Microsoft, Monitoring, White Papers,]]></dc:subject>
      <dc:date>2019-04-17T16:14:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Getting Started with Microsoft Azure Sentinel: Part 2 ]]></title>
      <link>https://www.greenhousedata.com/blog/getting-started-with-microsoft-azure-sentinel-part-2</link>
      <guid>https://www.greenhousedata.com/blog/getting-started-with-microsoft-azure-sentinel-part-2#When:18:58:00Z</guid>
      <description><![CDATA[<p>This is Part Two and the final entry in our introductory blog series on Azure Sentinel, Microsoft&#39;s new Security Information&nbsp;and Event Management&nbsp;(SIEM) tool for Azure environments. Read <a href="https://www.greenhousedata.com/blog/getting-started-with-microsoft-azure-sentinel-part-1">Part One here for information on what Sentinel is, how to set it up, and how to begin importing data from your Azure PaaS and IaaS</a>.</p>

<p>In Part Two, we&#39;ll examine deeper functionalities within Sentinel including Machine Learning, queries, and automation.</p>]]></description>
      <dc:subject><![CDATA[Azure, Datacenter Automation, Microsoft, Security,]]></dc:subject>
      <dc:date>2019-04-09T18:58:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Importing Schedules for Beekeeper Patching Automation Software ]]></title>
      <link>https://www.greenhousedata.com/blog/importing-schedules-for-beekeeper-patching-automation-software</link>
      <guid>https://www.greenhousedata.com/blog/importing-schedules-for-beekeeper-patching-automation-software#When:17:41:00Z</guid>
      <description><![CDATA[<p>This blog series shows you how to quickly import vital components for <a href="https://www.greenhousedata.com/software/beekeeper">configuring and scheduling your patches using Beekeeper automation</a>. Last week we looked at <a href="https://www.greenhousedata.com/blog/importing-data-into-beekeeper-patch-automation-software" target="_blank">how to import data</a>, this week we will demonstrate how to import a schedule for your patches.</p>]]></description>
      <dc:subject><![CDATA[Patching, Datacenter Automation, Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-04-04T17:41:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Getting Started with Microsoft Azure Sentinel: Part 1 ]]></title>
      <link>https://www.greenhousedata.com/blog/getting-started-with-microsoft-azure-sentinel-part-1</link>
      <guid>https://www.greenhousedata.com/blog/getting-started-with-microsoft-azure-sentinel-part-1#When:16:46:00Z</guid>
      <description><![CDATA[<p>Azure Sentinel is Microsoft&#39;s cloud-native SIEM (Security Information and Event Management) service with built-in AI analytics. It reduces the cost and complexity to provide a single pane of glass to get central and near real-time view of your whole environment.</p>

<p>Threats related to infrastructure, networking, users, and applications can be monitored via Azure Sentinel. As a cloud-native service, it scales as per your needs. It collates the data from your environment on-premises, in Azure, and any third party cloud providers. It uses Microsoft Threat Intelligence to analyze all the signals and filters out the noise from actual relevant alerts.</p>

<p>This two part blog series will introduce you to Azure Sentinel and show you how to get set up with the service and start exploring its many features.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, Microsoft, Security,]]></dc:subject>
      <dc:date>2019-04-02T16:46:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Importing Data Into Beekeeper Patch Automation Software ]]></title>
      <link>https://www.greenhousedata.com/blog/importing-data-into-beekeeper-patch-automation-software</link>
      <guid>https://www.greenhousedata.com/blog/importing-data-into-beekeeper-patch-automation-software#When:19:31:00Z</guid>
      <description><![CDATA[<p>When you enter data into Beekeeper Patching Automation, you use the UI to add servers groups, Windows Failover Clusters, and Exchange DAGs.&nbsp; Then, you assign validation tasks to these server groups or clusters.&nbsp; To create the execution job, you assign the server groups or clusters to a schedule.&nbsp; This can be time consuming.</p>

<p>I have created PowerShell scripts to do these tasks.&nbsp; In a series of blog posts, I will share these PowerShell scripts and go over their usage.</p>

<p>The first PowerShell script will export servers from an SCCM collection into a CSV.&nbsp; Then another script will import that CSV to create the appropriate Application groups, Windows Failover Clusters, or Exchange DAGs.</p>]]></description>
      <dc:subject><![CDATA[Software, Patching, Datacenter Automation, Enterprise Applications, IT Operations, Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-03-26T19:31:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Implement Cloud Tagging to Simplify Automation and Administration ]]></title>
      <link>https://www.greenhousedata.com/blog/implement-cloud-tagging-to-simplify-automation-and-administration</link>
      <guid>https://www.greenhousedata.com/blog/implement-cloud-tagging-to-simplify-automation-and-administration#When:21:29:00Z</guid>
      <description><![CDATA[<p>Whatever your cloud or virtualization platform of choice, you can implement tags on your resources in order to easily apply configuration changes or search by group.</p>

<p>As multi-cloud environments continue to become more and more popular and your virtual servers, storage, and associated components sprawl across various providers, efficient governance becomes even more critical.</p>

<p>By implementing a cloud resource tagging policy, you lay the groundwork to consistently apply automated or manual actions relating to allocation, reporting, chargeback, compliance, security, patching, software installation, and even decommissioning or scaling resources when required.</p>]]></description>
      <dc:subject><![CDATA[Azure, Multi-Cloud, Datacenter Automation, Cloud Hosting, IT Operations, VMware,]]></dc:subject>
      <dc:date>2019-03-21T21:29:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Automating Azure Alert Rule Creation Using PowerShell and ARM Templates ]]></title>
      <link>https://www.greenhousedata.com/blog/automating-alert-rule-creation-using-powershell-and-arm-templates</link>
      <guid>https://www.greenhousedata.com/blog/automating-alert-rule-creation-using-powershell-and-arm-templates#When:19:30:00Z</guid>
      <description><![CDATA[<p>Alert Rules in Azure are a tool to let you know when some condition of your choice has occurred within any given component of your Azure infrastructure. In other words, they alert you to potential problems so you can remedy them before anything serious goes wrong.</p>

<p>Have you ever had the tedious task of creating multiple alerts for all of the resources in your subscription? Let me tell you, it is really time consuming to create them from scratch one by one.</p>

<p>I have a PowerShell Script that can Target and Create specific metric alerts for the resources you define inside of the script, making it much simpler to create a large amount of alerts at one time.</p>

<p>Skip down to the script if you&rsquo;re familiar with Alerts already. If you aren&rsquo;t here&rsquo;s an overview on how they work.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, IT Operations, Microsoft, Monitoring,]]></dc:subject>
      <dc:date>2019-03-14T19:30:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Infrastructure as Code: The Cornerstone for DevOps &amp; Multicloud ]]></title>
      <link>https://www.greenhousedata.com/blog/infrastructure-as-code-the-cornerstone-for-devops-multicloud</link>
      <guid>https://www.greenhousedata.com/blog/infrastructure-as-code-the-cornerstone-for-devops-multicloud#When:23:03:00Z</guid>
      <description><![CDATA[<p>One key concept to master when dealing with cloud, containerized, or otherwise software-defined infrastructure is Infrastructure as Code. This may seem strange at first. After all, your code runs <em>on top</em> of infrastructure, right?</p>

<p>Infrastructure as code (IaC) works in practice by managing your computing resources &mdash; virtual machines, storage, networking, and all the associated policies for security and such &mdash; in the same manner as you treat your code. This packages everything necessary for your application, from the code and assets to the underlying infrastructure itself, together into what works functionally as a single deployment.</p>

<p>Just as DevOps combined development and operations into one entity, IaC combines code and infrastructure as one.</p>]]></description>
      <dc:subject><![CDATA[Multi-Cloud, Datacenter Automation, Cloud Hosting, DevOps, IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2019-03-06T23:03:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Writing to the Windows Application Log During a Beekeeper Execution Job ]]></title>
      <link>https://www.greenhousedata.com/blog/writing-to-the-windows-application-log-during-a-beekeeper-execution-job</link>
      <guid>https://www.greenhousedata.com/blog/writing-to-the-windows-application-log-during-a-beekeeper-execution-job#When:21:18:00Z</guid>
      <description><![CDATA[<p>Using a PowerShell validation during any of the Beekeeper Execution Job phases, you can write information to the Windows Application Log. This helps enable discovery for SCOM. The Event Log Validation Pack is a collection of PowerShell validations that you can customize in your environment.</p>

<p>Learn how to implement this, including downloadable Validation Pack and code snippets, in this blog post. For more information about Beekeeper patching automation software, <a href="https://www.greenhousedata.com/software/beekeeper">view the product page</a>.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-03-04T21:18:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What is Kubernetes and How Does it Make Container Administration Easier? ]]></title>
      <link>https://www.greenhousedata.com/blog/what-is-kubernetes-and-how-does-it-make-container-administration-easier</link>
      <guid>https://www.greenhousedata.com/blog/what-is-kubernetes-and-how-does-it-make-container-administration-easier#When:15:52:00Z</guid>
      <description><![CDATA[<p>Kubernetes has been kicking around since Google made it open source in 2014. Like many technologies it has taken some time to go mainstream, but with the rapid adoption of containers by many enterprise organizations, Kubernetes (or k8s) has become extremely popular as a method to manage, scale, and deploy containers across host platforms.</p>

<p>If you aren&rsquo;t very familiar with Kubernetes, here&rsquo;s why you might be interested in the platform and why it has proven essential to large scale containerized IT applications.</p>]]></description>
      <dc:subject><![CDATA[Multi-Cloud, Cloud Hosting, DevOps, Hybrid IT, IT Modernization,]]></dc:subject>
      <dc:date>2019-02-28T15:52:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Service Availability Reporting in SCOM ]]></title>
      <link>https://www.greenhousedata.com/blog/service-availability-reporting-in-scom</link>
      <guid>https://www.greenhousedata.com/blog/service-availability-reporting-in-scom#When:08:00:00Z</guid>
      <description><![CDATA[<p>Many customers frequently ask the question whether or not it is possible to fetch a report of up-time of a service being monitored with SCOM. Usually, the answer is &ndash; not out of the box. However, you can achieve this using a simple workaround.</p>

<p>One way of doing it is to author your own service monitor, but that involves considerable amount of knowledge and experience of management packs and the underlying coding. It usually takes a lot of time as well. Not everyone has the right knowledge or the time to spend on this so I thought I&rsquo;d share a quick trick I do to measure uptime of a service and also be able to present it to the concerned parties in the form of a report.</p>]]></description>
      <dc:subject><![CDATA[Enterprise Advisory Services, SCOM, IT Operations, Microsoft,]]></dc:subject>
      <dc:date>2019-02-20T08:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Run a Custom Script on an Azure VM When A Log Analytics Alert Is Triggered ]]></title>
      <link>https://www.greenhousedata.com/blog/run-a-custom-script-on-an-azure-vm-when-a-log-analytics-alert-is-triggered</link>
      <guid>https://www.greenhousedata.com/blog/run-a-custom-script-on-an-azure-vm-when-a-log-analytics-alert-is-triggered#When:06:00:00Z</guid>
      <description><![CDATA[<p>Sometimes you want to trigger a specific action when something is detected by one of your alert rules inside of Azure. If you want to immediately remediate the specific issue you are facing normally you would have to login to the machine once you receive the alert, but by using an Azure Automation account you don&rsquo;t have to take any additional steps to fix whatever threw the alert &mdash; just create your script and leave it to run whenever the alert is triggered. As simple as that.</p>

<p>This works perfectly when you need to resolve a common issue with a trusty PowerShell script that you have often used. This method will save you time and effort;&nbsp;you can rest assured that the issue is being taken care of with the help of a Custom Script Extension.</p>

<p>Running a custom script on a specific machine when an alert is triggered in Log Analytics is quite easy.&nbsp;Here are the following steps you need to follow to achieve this.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Cloud, Azure, Datacenter Automation, Cloud Hosting, IT Operations,]]></dc:subject>
      <dc:date>2019-02-13T06:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Beekeeper Patch Automation 5.1.0 Release Notes ]]></title>
      <link>https://www.greenhousedata.com/blog/beekeeper-patch-automation-5.1.0-release-notes</link>
      <guid>https://www.greenhousedata.com/blog/beekeeper-patch-automation-5.1.0-release-notes#When:16:38:00Z</guid>
      <description><![CDATA[<p>We&#39;re releasing version 5.1.0 of our Beekeeper patching automation software this week. Let&#39;s take a look at the new features available to make your patch workflow even more efficient.</p>]]></description>
      <dc:subject><![CDATA[Beekeeper Software, Documentation,]]></dc:subject>
      <dc:date>2019-02-12T16:38:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ OMS Is Now Azure Monitor: Get Smarter About Managing Your Infrastructure ]]></title>
      <link>https://www.greenhousedata.com/blog/oms-is-now-azure-monitor-get-smarter-about-managing-your-infrastructure</link>
      <guid>https://www.greenhousedata.com/blog/oms-is-now-azure-monitor-get-smarter-about-managing-your-infrastructure#When:19:49:00Z</guid>
      <description><![CDATA[<p>You may be familiar with Microsoft Operations Management Suite (OMS) &mdash; a management system that works to simplify your IT processes. Troubleshooting, change tracking, and updates are just a few common IT tasks that OMS could handle. OMS components brought together backup services, site recovery, log analytics, and automation and are available for hybrid, multi-cloud, and on-premises environments.</p>

<p>Microsoft deprecated OMS as of January 2019, moving all functionality into the Azure portal. Learn more about why OMS and the new Azure portal are useful for your IT workflow and what has changed with the migration to Azure.</p>]]></description>
      <dc:subject><![CDATA[Hybrid Cloud, Cloud, Solutions, Technology, Azure, Multi-Cloud, Cloud Hosting, Data Center Design, IT Operations, Microsoft,]]></dc:subject>
      <dc:date>2019-02-07T19:49:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The Easiest Targets for Cloud Automation ]]></title>
      <link>https://www.greenhousedata.com/blog/the-easiest-targets-for-cloud-automation</link>
      <guid>https://www.greenhousedata.com/blog/the-easiest-targets-for-cloud-automation#When:22:02:00Z</guid>
      <description><![CDATA[<p>Cloud-native automation and orchestration tools make IT administration easier &mdash; at least once you know what you&rsquo;re doing. While there is also some concern among the ranks of cloud technicians that automation could lead to job losses, by mastering the tools available you make yourself more valuable, while also finding and executing on efficiencies. Cloud automation is a win-win.</p>

<p>But where should you begin when it comes to automating your cloud environment? There are many moving parts in an enterprise cloud deployment, even within specific application clusters.</p>

<p>These are the three easiest targets for automation and orchestration.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Cloud Storage, Hybrid Cloud, Cloud, Azure, Multi-Cloud, Patching, Datacenter Automation, Cloud Hosting, Cloud Storage, Disaster Recovery, IT Operations, VMware,]]></dc:subject>
      <dc:date>2019-02-01T22:02:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Migrating Exchange to the Cloud? You’ll Want to Keep One Server On-Prem ]]></title>
      <link>https://www.greenhousedata.com/blog/migrating-exchange-to-the-cloud-youll-want-to-keep-one-server-on-prem</link>
      <guid>https://www.greenhousedata.com/blog/migrating-exchange-to-the-cloud-youll-want-to-keep-one-server-on-prem#When:18:05:00Z</guid>
      <description><![CDATA[<p>When you decide to move your Exchange environment to the cloud, you might be confused to discover that you still need to maintain an on-premises Exchange server. There are several reasons for this, stemming from the migration process and on to Identity Management.</p>

<p>If you&rsquo;re moving from an active on-premises Exchange deployment, you&rsquo;ll first configure an interim &ldquo;Exchange Hybrid&rdquo; environment which hosts mailboxes within Exchange Online and your local Exchange server. The two locations share namespace, address books, free-busy, calendars, really every Exchange functionality is synced between them. Mail flow and other functions appear to be internal, but might actually be processed and stored in the cloud environment.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Hybrid Cloud, Azure, Active Directory, O365, Migration, Cloud Hosting, Enterprise Applications, Hybrid IT, IT Modernization, Microsoft,]]></dc:subject>
      <dc:date>2019-01-24T18:05:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ 2018 Blog Wrap Up: Our Most Popular Posts ]]></title>
      <link>https://www.greenhousedata.com/blog/2018-blog-wrap-up-our-most-popular-posts</link>
      <guid>https://www.greenhousedata.com/blog/2018-blog-wrap-up-our-most-popular-posts#When:08:00:00Z</guid>
      <description><![CDATA[<p>Another year&nbsp;successful year has gone by&nbsp;on the Green House Data blog. We&#39;re thrilled to surpass 150,000 views in 2018! Thanks for reading our humble blog. In case you missed anything, here are the five top posts from 2018, covering VM performance monitoring, GDPR, and a subject no modern blog should be without&#8230;millennials.&nbsp;And more!</p>

<p>Don&#39;t forget to tune in after the New Years for more great data center, cloud,&nbsp;and managed IT services content!</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Data Center Design, Enterprise Applications, IT Modernization, IT Operations, Security,]]></dc:subject>
      <dc:date>2018-12-27T08:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How Human Resources Must Evolve IT Roles for Cloud ]]></title>
      <link>https://www.greenhousedata.com/blog/how-human-resources-must-evolve-it-roles-for-cloud</link>
      <guid>https://www.greenhousedata.com/blog/how-human-resources-must-evolve-it-roles-for-cloud#When:16:22:00Z</guid>
      <description><![CDATA[<p>Cloud computing has shaken up many IT roles. While daily tasks may not be dramatically different (depending on the IT team member in question), the general trend is an increased focus on hard cloud skills and soft business skills &mdash; in other words, discovering how to generate business value out of cloud systems, rather than simply making sure an application or piece of hardware is functioning properly.</p>

<p>We&rsquo;ve discussed previously how cloud <a href="https://www.greenhousedata.com/blog/new-guidelines-may-help-clear-up-cloud-accounting-headaches">can be difficult for Accounting to classify</a>. But even Human Resources has to adapt. Much has been made of the cloud skills gap as a challenge to hiring the right talent. A shortage of qualified applicants may be real, but if your HR team doesn&rsquo;t change the actual job descriptions and roles for which they are hiring, they won&rsquo;t find the skills they need, either.</p>

<p>Here&rsquo;s how the cloud is changing IT team roles and responsibilities.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, IT Operations,]]></dc:subject>
      <dc:date>2018-12-19T16:22:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Can DevOps as a Service Alleviate Adoption Pains? ]]></title>
      <link>https://www.greenhousedata.com/blog/can-devops-as-a-service-alleviate-adoption-pains</link>
      <guid>https://www.greenhousedata.com/blog/can-devops-as-a-service-alleviate-adoption-pains#When:18:29:00Z</guid>
      <description><![CDATA[<p>DevOps practices have moved past pure software development and into enterprise adoption, facilitating faster updates to applications and associated infrastructure.</p>

<p>The crux of DevOps is the unification of tools and processes between development and operations teams to decrease time to market/deployment and implement continuous improvements throughout the development, testing, implementation, and ongoing maintenance of applications and underlying infrastructure.</p>

<p>Despite widespread DevOps adoption &mdash; or at least the majority of surveyed enterprises reporting they have started the journey towards it &mdash; many organizations are still struggling. Enter DevOps as a Service. But is DevOps as a Service a legitimate offering?&nbsp;The definition is still evolving, and different MSPs may offer different takes on DevOps-a-a-S.</p>]]></description>
      <dc:subject><![CDATA[Managed Services, DevOps, IT Modernization, IT Operations, Software Development,]]></dc:subject>
      <dc:date>2018-12-13T18:29:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Technology Compliance Audits: Application and Server Patch Automation ]]></title>
      <link>https://www.greenhousedata.com/blog/technology-compliance-audits-application-and-server-patch-automation</link>
      <guid>https://www.greenhousedata.com/blog/technology-compliance-audits-application-and-server-patch-automation#When:22:31:00Z</guid>
      <description><![CDATA[<p>Meet Bruce.</p>

<p>Bruce is a 45-year-old IT manager, with twenty years experience working for ACME Power. Bruce has three photos on his desk &ndash; one of his wife, Linda; one of his kids - Davy and Wendy; and one of Microsoft CEO Satya Nadella. Apart from his laptop, Bruce&rsquo;s desk is pristine. He walked into the office this morning with a big smile on his face and passed out donuts to his colleagues.</p>

<p>Today has been highlighted in Bruce&rsquo;s Outlook calendar for weeks. It&rsquo;s day one of a thorough compliance audit of ACME Power&rsquo;s application and server infrastructure.&nbsp;</p>]]></description>
      <dc:subject><![CDATA[Patching, SCOM, SCCM, Datacenter Automation, Security,]]></dc:subject>
      <dc:date>2018-12-06T22:31:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Are You in SaaS Denial? Here’s How to Get Ahead of Adoption Hurdles ]]></title>
      <link>https://www.greenhousedata.com/blog/are-you-in-saas-denial-heres-how-to-get-ahead-of-adoption-hurdles</link>
      <guid>https://www.greenhousedata.com/blog/are-you-in-saas-denial-heres-how-to-get-ahead-of-adoption-hurdles#When:23:42:00Z</guid>
      <description><![CDATA[<p>Will we ever get past talking about IaaS vs. PaaS vs. SaaS? Perhaps not. Gartner recently published a list of the&nbsp;<a href="https://www.gartner.com/smarterwithgartner/top-10-trends-impacting-infrastructure-and-operations-for-2019/?utm_medium=social&amp;utm_source=twitter&amp;utm_campaign=SM_GB_YOY_GTR_SOC_SF1_SM-SWG&amp;sf203606773=1" target="_blank">Top 10 Trends Impacting IT Infrastructure and Operations for 2019</a>. Sitting at Number 8?&nbsp;Software as a Service (SaaS) denial.</p>

<p>Basically, most organizations have been hyper focused on Infrastructure and Platforms as a Service &mdash; migrating to cloud VMs, hiring admins for Azure and AWS ecosystems, learning Kubernetes and Docker.</p>

<p>Meanwhile, shadow IT and the overall enterprise trend is to initially prefer SaaS. Of course, SaaS has made inroads with IT departments even at the enterprise level, especially Office 365. But without Infrastructure and Operations teams taking SaaS seriously, your overall IT environment could be opened up to security risks on top of integration problems, fragmentation, and service delivery concerns.</p>

<p>Are you in SaaS denial? Do you have blinders on as you focus entirely on IaaS adoption or other more pressing matters?&nbsp;Now is the time to get ahead of the SaaS adoption hurdles by being proactive within your IT and operations departments.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, Enterprise Applications, IT Operations, Security,]]></dc:subject>
      <dc:date>2018-12-05T23:42:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Azure Stack: What You Need to Know Before Deploying Your On-Premises Cloud ]]></title>
      <link>https://www.greenhousedata.com/blog/azure-stack-what-you-need-to-know-before-deploying-your-on-premises-cloud</link>
      <guid>https://www.greenhousedata.com/blog/azure-stack-what-you-need-to-know-before-deploying-your-on-premises-cloud#When:22:06:00Z</guid>
      <description><![CDATA[<p>Azure Stack enables you to run Azure workloads on-premises or even within a colocation facility, enabling stronger security and control over your data and applications with a single management platform for your public Azure cloud infrastructure and your Azure Stack deployment.</p>

<p>You can use many of the best Azure tools, processes, and features &mdash; including add-ons and open source solutions from the Azure Marketplace &mdash; in the cloud of your choice, helping to meet regulatory or technical challenges.</p>

<p>Before you get started with this intriguing hybrid and private cloud technology from Microsoft, there are a few things you&rsquo;ll need to keep in mind, however. Here are some of the most important.</p>]]></description>
      <dc:subject><![CDATA[Azure, Cloud Hosting, Microsoft,]]></dc:subject>
      <dc:date>2018-11-28T22:06:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How to Download an Azure Automation Connection Certificate Locally ]]></title>
      <link>https://www.greenhousedata.com/blog/how-to-download-an-azure-automation-connection-certificate-locally</link>
      <guid>https://www.greenhousedata.com/blog/how-to-download-an-azure-automation-connection-certificate-locally#When:20:07:00Z</guid>
      <description><![CDATA[<p>When you work with Azure Automation &mdash; and especially if you use Hybrid Worker machines &mdash; sometimes you need to use the certificates that are part of the connections created by the automation account on a local VM or server.</p>

<p>Runbooks that use these kinds of certificates work fine in the Azure environment, but if you need to run it in your local environment, using Hybrid Worker machines, this represents a challenge. Here&#39;s how to get those connection certificates on your Hybrid Worker.</p>]]></description>
      <dc:subject><![CDATA[Azure, Datacenter Automation,]]></dc:subject>
      <dc:date>2018-11-27T20:07:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Solving the InfoSec Risk Equation ]]></title>
      <link>https://www.greenhousedata.com/blog/solving-the-infosec-risk-equation</link>
      <guid>https://www.greenhousedata.com/blog/solving-the-infosec-risk-equation#When:17:36:00Z</guid>
      <description><![CDATA[<p>With all the talk about cloud security threats, it&rsquo;s important to remember that no matter where your data and applications reside, you should consider your data insecure.</p>

<p>Fundamentally, security isn&rsquo;t a hyper-complex enterprise; It&rsquo;s not, as they say, rocket science. It often feels that way, because the discipline is so broad in scope; encompassing both disparate technologies and governance frameworks. But, the vast majority of risk can be mitigated through adhering to basic foundational security.</p>

<p>More to know: A review of breaches outlined within the Verizon 2017 Data Breach Investigations Report (DBIR) against the Center for Internet Security (CIS) top 20 critical security controls found that:</p>

<p>&bull; Adopting the first 5 controls could mitigate 85% of attacks, and<br />
&bull; Adopting all 20 controls could mitigate 97% of attacks.</p>

<p>That basic foundational security can be expressed in one essential formula, which boils down what is under your control as an IT security professional and what is outside your purview. That equation is as follows.</p>]]></description>
      <dc:subject><![CDATA[IT Operations, Security,]]></dc:subject>
      <dc:date>2018-11-15T17:36:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Should You Enable Autogrowth on SCOM Operations Database? ]]></title>
      <link>https://www.greenhousedata.com/blog/should-you-enable-autogrowth-on-scom-operations-database</link>
      <guid>https://www.greenhousedata.com/blog/should-you-enable-autogrowth-on-scom-operations-database#When:08:00:00Z</guid>
      <description><![CDATA[<p>You should put a fair amount of thought into designing your SCOM infrastructure. You need to make sure not only that the design works efficiently for the existing requirements you have, but also that you will be able to accommodate the future growth and expand your current Management Group without compromising its efficiency or performance.</p>

<p>SCOM includes the option to autogrow your Operations database. You can enable this to allow the DB to grow in size along with your overall SCOM environment. In my opinion, you should not do so, however, unless you are absolutely forced to.</p>]]></description>
      <dc:subject><![CDATA[SCOM,]]></dc:subject>
      <dc:date>2018-11-14T08:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Beyond One and Done: Consulting and Managed Services Enable Continuous Improvement ]]></title>
      <link>https://www.greenhousedata.com/blog/beyond-one-done-consulting-managed-services-enable-continuous-improvement</link>
      <guid>https://www.greenhousedata.com/blog/beyond-one-done-consulting-managed-services-enable-continuous-improvement#When:11:24:00Z</guid>
      <description><![CDATA[<p>A traditional enterprise advisory engagement is often a &ldquo;one and done&rdquo; deal &mdash; you have an IT problem to solve or a new technology to implement and the consulting agency comes in, gathers info, makes recommendations, helps with the execution and steps out of your way.</p>

<p>That&rsquo;s great for large-scale improvements. But modern IT practices preach continuous improvement, agile methodology, and DevOps practices even beyond the software development world. With the advent of cloud, it&rsquo;s all about continuous, constant iterations of your software and services.</p>

<p>Many SaaS platforms take care of this for you. That may not be the case with IaaS and remaining hardware, however. Focusing your existing staff on business goals and service delivery while augmenting it with an advisory and managed service provider partner can take even your backend infrastructure and upstack applications into the realm of continuous improvement via cloud management services, automation, and feedback loops.</p>]]></description>
      <dc:subject><![CDATA[DevOps, IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2018-11-08T11:24:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Alleviate Direct and Indirect Patching Costs Through Automation ]]></title>
      <link>https://www.greenhousedata.com/blog/alleviate-direct-and-indirect-patching-costs-through-automation</link>
      <guid>https://www.greenhousedata.com/blog/alleviate-direct-and-indirect-patching-costs-through-automation#When:21:37:00Z</guid>
      <description><![CDATA[<p>In a world where we have self-driving cars, cures for complex diseases, and where we&rsquo;re building houses with 3D printers, some enterprise organizations still manually patch servers which run their mission-critical applications.</p>

<p>Enterprise data center management can fray the nerves of even the most experienced administrators. &ldquo;To err is human&rdquo;, as the saying goes, and errors can happen during patching, even with the powerful toolset in Microsoft System Center. A server admin could spend hours struggling with a single patch and cause productivity delays the next day for the systems which don&rsquo;t get addressed.</p>

<p>There are effective ways of automating these tasks, which come with price tags both directly and indirectly related to patching itself.</p>]]></description>
      <dc:subject><![CDATA[Patching, SCOM, SCCM, Datacenter Automation, Microsoft,]]></dc:subject>
      <dc:date>2018-11-07T21:37:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Why Managed Services Are Key to Fill the Multi-Cloud Skills Gap ]]></title>
      <link>https://www.greenhousedata.com/blog/why-managed-services-are-key-to-fill-the-multi-cloud-skills-gap</link>
      <guid>https://www.greenhousedata.com/blog/why-managed-services-are-key-to-fill-the-multi-cloud-skills-gap#When:21:18:00Z</guid>
      <description><![CDATA[<p>Multi-cloud is the IT service model du jour, but it comes with a set of challenges that many IT departments aren&rsquo;t yet ready to tackle. There are many reasons to go with more than one cloud provider, including the use of specific services or abilities, backing up storage across various vendors, maintaining availability or minimizing latency, and even using different cloud vendors as bargaining chips for pricing negotiation.</p>

<p>A managed services partner might be the best way for you to take advantage of multi-cloud IT infrastructure and services, especially if you face the all-too-common cloud skills gap that many organizations encounter.</p>

<p>Read on for statistics on multi-cloud adoption and cloud skills difficulties, as well as ways in which a partner can help you alleviate the top multi-cloud obstacles.</p>]]></description>
      <dc:subject><![CDATA[Azure, Managed Services, Multi-Cloud, Cloud Hosting, Hybrid IT, IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2018-11-01T21:18:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How to Extend Your Azure Automation Library Modules ]]></title>
      <link>https://www.greenhousedata.com/blog/how-to-extend-your-azure-automation-library-modules</link>
      <guid>https://www.greenhousedata.com/blog/how-to-extend-your-azure-automation-library-modules#When:21:20:00Z</guid>
      <description><![CDATA[<p>Azure Automation is a cloud-based configuration service that automatically manages your Azure and non-Azure environments based on your runbooks, update management features, and shared capabilities like access controls, global storage of credentials/certificates/etc, tags, and more.</p>

<p>Included in Azure Automation is the option to extend your libraries. You can import a set of libraries called Modules to your automation account from a preexisting list that can be found in the Gallery or by uploading script files of your own.</p>

<p>Below you&rsquo;ll see where to upload or choose these Modules.</p>]]></description>
      <dc:subject><![CDATA[Azure, Datacenter Automation,]]></dc:subject>
      <dc:date>2018-10-31T21:20:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ The Growing Importance of Digital Ethics, Transparency, and Privacy ]]></title>
      <link>https://www.greenhousedata.com/blog/the-growing-importance-of-digital-ethics-transparency-and-privacy</link>
      <guid>https://www.greenhousedata.com/blog/the-growing-importance-of-digital-ethics-transparency-and-privacy#When:18:40:00Z</guid>
      <description><![CDATA[<p>Technology continues to envelop our daily lives, in business, at home, in leisure and athletics, across the globe and into space. Despite wide ranging benefits, corporate entities and individual consumers alike have begun to recognize the risks inherent in digital services.</p>

<p>I recently spoke at a Daniels Fund conference panel about ethics in business. A student remarked, &ldquo;I have access to so much data in the workplace. How can you protect from a bad apple stealing your information?&rdquo;</p>

<p>Ethics is the key to protecting from these types of internal threats &mdash; and it helps your company handle external threats as well.</p>

<p>Gartner has even <a href="https://www.gartner.com/smarterwithgartner/gartner-top-10-strategic-technology-trends-for-2019/" target="_blank">named Digital Ethics and Privacy as their Number 9 trend on the Top 10 Strategic Technology Trends for 2019</a>. They recognize this growing awareness of the value of personal information and concern among various entities and individuals over how personal and sensitive data is being consumed, processed, and shared among public and private organizations.</p>

<p>Gartner&rsquo;s advice? Move from asking &ldquo;Are we secure?&rdquo; or &ldquo;Are we compliant with regulations?&rdquo; to asking &ldquo;Are we doing the right thing?&rdquo;</p>]]></description>
      <dc:subject><![CDATA[Managed Services, Green Data Center, Security,]]></dc:subject>
      <dc:date>2018-10-24T18:40:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Application Patching, Testing, and Validation: Closing the Gaps that Microsoft SCCM Doesn’t Address ]]></title>
      <link>https://www.greenhousedata.com/blog/application-patching-testing-and-validation-closing-the-gaps-that-microsoft</link>
      <guid>https://www.greenhousedata.com/blog/application-patching-testing-and-validation-closing-the-gaps-that-microsoft#When:17:43:00Z</guid>
      <description><![CDATA[<p>Automated patching server application patching can alleviate a lot of work for IT management teams. It shifts the patching and updating process outside of business hours. In an ideal world, Microsoft&rsquo;s System Center Configuration Manager (SCCM) would flawlessly execute server application patches.&nbsp;</p>

<p>However, there are some gaps in SCCM patching functionality, especially when it comes to orchestration, validation, and report logs. These can cause issues with QA and risk mitigation and can drive frustrations among your IT staff.</p>]]></description>
      <dc:subject><![CDATA[Azure, Patching, SCCM, Microsoft,]]></dc:subject>
      <dc:date>2018-10-24T17:43:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How to Run Azure Automation Runbooks Locally While Accessing Assets ]]></title>
      <link>https://www.greenhousedata.com/blog/how-to-run-azure-automation-runbook-locally-while-accessing-assets</link>
      <guid>https://www.greenhousedata.com/blog/how-to-run-azure-automation-runbook-locally-while-accessing-assets#When:15:14:00Z</guid>
      <description><![CDATA[<p>When you work with Azure Automation, you might find yourself coding locally, putting all the initial logic into the script, copying and pasting the code to the web to run it, and then testing the code from the portal.</p>

<p>Usually this practice takes longer to execute and will require a printout of variables or comments to follow the code execution, as you are not debugging your script.</p>

<p>There is another, possibly better, way to get your PowerShell code into Azure.</p>]]></description>
      <dc:subject><![CDATA[Azure, Datacenter Automation,]]></dc:subject>
      <dc:date>2018-10-18T15:14:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Understanding and Preventing SQL Injection (SQLi), One of the Most Common Attack Vectors ]]></title>
      <link>https://www.greenhousedata.com/blog/understanding-preventing-sql-injection-one-of-most-common-attack-vectors</link>
      <guid>https://www.greenhousedata.com/blog/understanding-preventing-sql-injection-one-of-most-common-attack-vectors#When:15:48:00Z</guid>
      <description><![CDATA[<p>Your data is your business. Your databases, and the data-driven applications that leverage them, should be regularly audited for vulnerabilities. One of the top risks facing your data today is SQL injection (SQLi).&nbsp;According to the 2018 Verizon Data Breach Incident Report (DBIR), SQLi was the second most common form of hacking varieties within information breaches, exceeded only by stolen credentials.</p>

<p>This attack vector involves the exploit of programmatic weaknesses in applications to run unintended code to manipulate your backend SQL databases, and thus access information or even gain administrative access and credentials.</p>

<p>Any application that uses SQL could be subject to this type of attack, from simple websites to SaaS apps like your CRM and ERP &mdash; even VoIP systems. This attack is also not limited to applications exposed to the internet. Internal applications are prime targets for attackers who have breached your external boundary (e.g., through phishing).</p>]]></description>
      <dc:subject><![CDATA[Cloud Storage, Security,]]></dc:subject>
      <dc:date>2018-10-17T15:48:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Business Indicators to Help You Decide Public vs. Hybrid/Private Cloud ]]></title>
      <link>https://www.greenhousedata.com/blog/business-indicators-to-help-you-decide-public-vs.-hybrid-private-cloud</link>
      <guid>https://www.greenhousedata.com/blog/business-indicators-to-help-you-decide-public-vs.-hybrid-private-cloud#When:11:44:00Z</guid>
      <description><![CDATA[<p>There are myriad technical considerations when deciding how to architect and deploy your cloud infrastructure, but your business structure, size, strategy, and industry are also significant factors.</p>

<p>You don&rsquo;t need to take a deep dive into technical evaluations of each workload to choose between public cloud and a hybrid or private infrastructure. It&rsquo;s possible that your business practices will make that decision for you before you ever get to individual app/system analysis.</p>

<p>Here are the business traits to consider as you weigh your cloud options.</p>]]></description>
      <dc:subject><![CDATA[Managed Services, Cloud Hosting, Hybrid IT, IT Operations,]]></dc:subject>
      <dc:date>2018-10-11T11:44:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Microsoft Azure Active Directory – Identity Models Explained ]]></title>
      <link>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-identity-models-explained</link>
      <guid>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-identity-models-explained#When:17:42:00Z</guid>
      <description><![CDATA[<p>Microsoft Azure Active Directory (AAD) is a multi-tenant cloud-based directory and identity management service. It combines core directory services, access management, and identity protection in to a single solution. Azure Active Directory is not to be confused with Azure Active Directory Domain Services, which is a separate service and not the focus of this article.</p>

<p>For every organization that chooses to subscribe to Microsoft Online Services&ndash; Office 365, Dynamics 365, Intune, etc., choosing the correct identity model for AAD becomes an important task. In this article, we will have a look at the characteristics of each.</p>

<p>While there are no specific dependencies on the identity model of AAD for Microsoft Online Services to function, your organizational needs and other factors such as manageability, access control, auditing, and user experience determine which identity model should be deployed.</p>]]></description>
      <dc:subject><![CDATA[Azure, Active Directory, Cloud Hosting, Microsoft,]]></dc:subject>
      <dc:date>2018-10-10T17:42:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ What Is the Difference Between Microsoft SCCM and Microsoft SCOM? ]]></title>
      <link>https://www.greenhousedata.com/blog/what-is-difference-microsoft-sccm-microsoft-scom</link>
      <guid>https://www.greenhousedata.com/blog/what-is-difference-microsoft-sccm-microsoft-scom#When:21:55:00Z</guid>
      <description><![CDATA[<p>Microsoft&rsquo;s products &ldquo;SCCM&rdquo; and &ldquo;SCOM&rdquo; sound like confusingly-named twins, but try to get past your first impression of them as a set in identical dresses posing for a portrait. It is true that they are in the same Microsoft system center family, but each has its own distinctive traits and roles.</p>]]></description>
      <dc:subject><![CDATA[Microsoft,]]></dc:subject>
      <dc:date>2018-10-05T21:55:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Manage Data Across Your Cloud(s) with Data Federation, Data Hubs, or Data Lakes ]]></title>
      <link>https://www.greenhousedata.com/blog/manage-data-across-your-clouds-with-data-federation-data-hubs-or-data-lakes</link>
      <guid>https://www.greenhousedata.com/blog/manage-data-across-your-clouds-with-data-federation-data-hubs-or-data-lakes#When:22:57:00Z</guid>
      <description><![CDATA[<p>As more and more businesses move their applications and associated data to the cloud, managing all that information becomes more complicated.</p>

<p>IT no longer has complete control and insight over every aspect of the datastore; instead as multiple cloud providers are implemented and endpoint data is served and collected from widely-flung users and workstations, you&rsquo;re likely to run into compatibility and versioning issues between various databases and storage platforms. The data management problem grows even larger as multicloud, the Internet of Things, and Big Data initiatives rise in popularity and real-world applicability.</p>

<p>Three ways to get all your ever-growing databases and datastores on the same page are data federation, data hubs, and data lakes. What are the differences between each, and what are some pros and cons of their use?</p>]]></description>
      <dc:subject><![CDATA[Cloud Storage, Data Center Design,]]></dc:subject>
      <dc:date>2018-10-04T22:57:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Start Automating Your Cloud with Azure Automation ]]></title>
      <link>https://www.greenhousedata.com/blog/start-automating-your-cloud-with-azure-automation</link>
      <guid>https://www.greenhousedata.com/blog/start-automating-your-cloud-with-azure-automation#When:19:48:00Z</guid>
      <description><![CDATA[<p>As part of any monitoring strategy, we might need to automate some tasks to provide key information to evaluate the state of our infrastructure or apply a repetitive action to resolve specific issues.</p>

<p>We have several ways to implement this. One option is to use Microsoft&rsquo;s Azure Automation toolset. Let&rsquo;s explore what you can control with Azure Automation and how to get started using it for cloud server update management, configuration, and more.</p>]]></description>
      <dc:subject><![CDATA[Azure, Patching, Cloud Hosting, Microsoft,]]></dc:subject>
      <dc:date>2018-10-03T19:48:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ How to Use VSAE to Create Your First Management Pack to Discover an App Using Its Registry Key ]]></title>
      <link>https://www.greenhousedata.com/blog/how-to-use-vsae-create-management-pack-discover-application-registry-key</link>
      <guid>https://www.greenhousedata.com/blog/how-to-use-vsae-create-management-pack-discover-application-registry-key#When:20:41:00Z</guid>
      <description><![CDATA[<p>Creating a new Management Pack is not complicated&mdash;all you need to do is first install Visual Studio Authoring Extensions.</p>

<p>This blog will walk you through how to create your first Management Pack in Systems Center Operations Manager, one that will discover apps by identifying their registry key.</p>]]></description>
      <dc:subject><![CDATA[SCOM, Management Packs, Microsoft,]]></dc:subject>
      <dc:date>2018-09-26T20:41:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Shifting Ground for Data Privacy: The Latest on CCPA and Privacy Shield Laws ]]></title>
      <link>https://www.greenhousedata.com/blog/shifting-ground-for-data-privacy-the-latest-on-ccpa-and-privacy-shield-laws</link>
      <guid>https://www.greenhousedata.com/blog/shifting-ground-for-data-privacy-the-latest-on-ccpa-and-privacy-shield-laws#When:20:09:00Z</guid>
      <description><![CDATA[<p>GDPR? Old news. (We&rsquo;ll just pass over the fact that <a href="https://www.pymnts.com/news/b2b-payments/2018/global-supply-chain-gdpr-compliance-data-security-regulation/" target="_blank">many organizations have yet to reach compliance&hellip;that&rsquo;s another story</a>.) While hosting providers that advertise to European companies and individuals <a href="https://www.greenhousedata.com/blog/do-you-need-to-worry-about-gdpr-compliance">must comply with the EU law</a>, there are other legal requirements that US-focused organizations have to consider, namely Data Shield and an upcoming compliance mandate in the state of California that is similar to GDPR itself.</p>

<p>Privacy Shield&nbsp;is an international law in flux, with EU lawmakers threatening to withdraw entirely if the USA does not enforce compliance. The California Consumer Privacy Act (CCPA) will go into effect in&nbsp;2020.</p>

<p>What do these laws entail? And should your organization be concerned with these data privacy measures?</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2018-09-26T20:09:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ High Availability vs. Fault Tolerance vs. Disaster Recovery ]]></title>
      <link>https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery</link>
      <guid>https://www.greenhousedata.com/blog/high-availability-vs-fault-tolerance-vs-disaster-recovery#When:13:56:00Z</guid>
      <description><![CDATA[<p>You need IT infrastructure that you can count on even when you run into the rare network outage, equipment failure, or power issue. When your systems run into trouble, that&rsquo;s where one or more of the three primary availability strategies will come into play: high availability, fault tolerance, and/or disaster recovery.</p>

<p>While each of these infrastructure design strategies has a role in keeping your critical applications and data up and running, they do not serve the same purpose. Simply because you operate a High Availability infrastructure does not mean you shouldn&rsquo;t implement a disaster recovery site &mdash; and assuming otherwise risks disaster indeed.</p>

<p>What&rsquo;s the difference between HA, FT, and DR anyway? Do you really need DR if you have HA set up?</p>]]></description>
      <dc:subject><![CDATA[Azure, Disaster Recovery, VMware,]]></dc:subject>
      <dc:date>2018-09-20T13:56:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Microsoft Azure Active Directory: Getting Started with Identity Management in the Cloud, Part 2 ]]></title>
      <link>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-getting-started-with-identity-management-i</link>
      <guid>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-getting-started-with-identity-management-i#When:15:25:00Z</guid>
      <description><![CDATA[<p>Microsoft Azure Active Directory, or AAD,&nbsp;is an IDaaS (Identity as a Service) offering that helps you manage corporate identities in the cloud. In this blog series, we&#39;re taking a look at the primary AAD features that you&#39;ll use to get your ID management up and running for Azure cloud services.</p>

<p>In Part 1 we discussed Connect, Single-Sign On, and Multifactor Authentication. You can also find a table of AAD pricing on that post. Remember, this series is not a deep dive into AAD configuration, but rather an overview of key features. Depending on your SKU you may or may not have access to all of these features.</p>

<p>Part 2 includes Self Service Password Resets, Identity Protection, Conditional Access, and Privileged Identity Management. These features help you control access and maintain security and compliance protocol across your enterprise cloud.</p>]]></description>
      <dc:subject><![CDATA[Azure, Active Directory, Cloud Hosting, Microsoft, Security,]]></dc:subject>
      <dc:date>2018-09-19T15:25:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Common Mistakes to Avoid When Configuring Network Policies for VPN ]]></title>
      <link>https://www.greenhousedata.com/blog/common-mistakes-to-avoid-when-configuring-network-policies-for-vpn</link>
      <guid>https://www.greenhousedata.com/blog/common-mistakes-to-avoid-when-configuring-network-policies-for-vpn#When:21:12:00Z</guid>
      <description><![CDATA[<p>A Network Policy Server is Microsoft implementation of a RADIUS server that performs authentication, authorization, and accounting for remote VPN connections. Network policies are defined by network administrators to use conditions, settings, and constraints in order to determine who can connect to the network.</p>

<p>I was recently involved in reviewing the existing VPN solution and then deploying another solution for a client. Here are some common mistakes I found made when configuring these policies.</p>]]></description>
      <dc:subject><![CDATA[Microsoft, Security,]]></dc:subject>
      <dc:date>2018-09-13T21:12:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Adjusting Your Channel Operations for Cloud Resale ]]></title>
      <link>https://www.greenhousedata.com/blog/adjusting-your-channel-operations-for-cloud-resale</link>
      <guid>https://www.greenhousedata.com/blog/adjusting-your-channel-operations-for-cloud-resale#When:11:52:00Z</guid>
      <description><![CDATA[<p>The IT channel is taking ever bigger bites out of the cloud computing market. Only 39% of companies report sourcing their cloud services directly from Cloud Service Providers, leaving the remaining 61% to a mix of CSPs and third parties, with 10% coming primarily from third parties alone, <a href="https://www.comptia.org/resources/cloud-computing-trends-research" target="_blank">according to a CompTIA survey</a>. Meanwhile, IaaS, Security as a Service (SECaaS), and SaaS all offer higher average MMR than Contact Center as a Service, Data Networks, and Voice Network services, <a href="https://www.goavant.net/Cloud-Channel-Survey" target="_blank">according to Avant</a>.</p>

<p>If you&rsquo;re looking to shift some of your clients and sales towards the cloud, you need to adjust your operations accordingly or risk losing customers to direct sales or competitors.</p>

<p>Here are the biggest changes you&rsquo;ll need to make to your channel sales and IT operations in order to maximize on your cloud resale strategy.</p>]]></description>
      <dc:subject><![CDATA[Cloud Hosting, IT Channel,]]></dc:subject>
      <dc:date>2018-09-13T11:52:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Hurricane Florence Preparations ]]></title>
      <link>https://www.greenhousedata.com/blog/hurricane-florence-preparations</link>
      <guid>https://www.greenhousedata.com/blog/hurricane-florence-preparations#When:21:00:00Z</guid>
      <description><![CDATA[<p>The Green House Data team is closely monitoring Hurricane Florence as the storm approaches landfall and will continue to monitor the storms&rsquo; progress. We&#39;ve taken the following steps and precautions for the storm.</p>]]></description>
      <dc:subject><![CDATA[]]></dc:subject>
      <dc:date>2018-09-12T21:00:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Microsoft Azure Active Directory: Getting Started with Identity Management in the Cloud, Part 1 ]]></title>
      <link>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-getting-started-cloud-identity-management</link>
      <guid>https://www.greenhousedata.com/blog/microsoft-azure-active-directory-getting-started-cloud-identity-management#When:15:23:00Z</guid>
      <description><![CDATA[<p>Microsoft Azure Active Directory is an IDaaS (Identity as a Service) offering that helps you manage corporate identities in the cloud. The solution itself is a cloud service that is hosted in Microsoft Azure datacenters globally. You can provision your tenant in a datacenter closest to where your organization is located.</p>

<p>Since AAD is a cloud offering it of course requires a paid subscription to use many of its features. But there&rsquo;s a free tier for those who want to explore and are just getting started with the service.</p>

<p>This two part article is not a deep dive how-to guide. Rather, this is an effort to talk about a few major features available with AAD that you can use to get started with managing identities in the cloud. Depending on your AAD SKU, you may, or you may not have some of the features that are being discussed.</p>]]></description>
      <dc:subject><![CDATA[Azure, Active Directory, Cloud Hosting, Microsoft,]]></dc:subject>
      <dc:date>2018-09-06T15:23:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ 2FA Isn’t a Magic Bullet ]]></title>
      <link>https://www.greenhousedata.com/blog/2fa-isnt-a-magic-bullet</link>
      <guid>https://www.greenhousedata.com/blog/2fa-isnt-a-magic-bullet#When:10:34:00Z</guid>
      <description><![CDATA[<p>Let&rsquo;s get this out of the way first: two factor authentication is an effective mode of account verification and far, far better than a simple username and password (single factor) authentication method. But it isn&rsquo;t a magic bullet and can be overcome, especially with clever social engineering (unsurprisingly, the weakest link in security remains people rather than technology). Ultimately, 2FA is only as secure as the method and technology or product used to secure it.</p>

<p>Here&rsquo;s how 2FA can be overcome by determined hackers and how you can best maintain account integrity across your organization or personal accounts.</p>]]></description>
      <dc:subject><![CDATA[Security,]]></dc:subject>
      <dc:date>2018-09-06T10:34:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Turning Your IT Department into a Service Center ]]></title>
      <link>https://www.greenhousedata.com/blog/turning-your-it-department-into-a-service-center</link>
      <guid>https://www.greenhousedata.com/blog/turning-your-it-department-into-a-service-center#When:22:11:00Z</guid>
      <description><![CDATA[<p>Here we are again, talking about digital transformation. While the pile of buzzwords threatens to overwhelm at times, this particular movement has real benefits for organizations that are still running IT in the old style, with break-fix scrambling, disjointed service delivery, and a take-it-or-leave it approach to technology procurement.</p>

<p>Rather than focusing simply on the end goal from an IT perspective, your IT department should be focused on the bigger picture. Your users are in effect your customers &mdash; and your company&rsquo;s customers are supported by those users. By bringing business goals and processes under the IT umbrella, you help foster communication, efficiency, improve IT services, and most importantly revenue growth across the organization.</p>

<p>Here are three areas to focus on when transforming your IT department into a service center.</p>]]></description>
      <dc:subject><![CDATA[Managed Services, DevOps, IT Modernization, IT Operations,]]></dc:subject>
      <dc:date>2018-08-30T22:11:00+00:00</dc:date>
    </item>
    <item>
      <title><![CDATA[ Azure Management Groups Simplify Subscription Administration ]]></title>
      <link>https://www.greenhousedata.com/blog/azure-management-groups-simplify-subscription-administration</link>
      <guid>https://www.greenhousedata.com/blog/azure-management-groups-simplify-subscription-administration#When:21:27:00Z</guid>
      <description><![CDATA[<p>If your enterprise cloud environment has started to sprawl out beyond one or two Azure subscriptions, chances are you&rsquo;ll need to implement some form of management and policy enforcement across your Enterprise Agreement to control costs and ensure compliance. Enter Azure Management Groups.</p>

<p>Management Groups can be used to apply conditions to subscriptions based on Azure regions, SKU sizes, server versions, resource type, and more. They work in conjunction with Azure Policy and Azure Role Based Access Controls (RBAC) and are similar to Active Directory in their setup and administration.</p>]]></description>
      <dc:subject><![CDATA[Cloud, Azure, Cloud Hosting, Microsoft,]]></dc:subject>
      <dc:date>2018-08-30T21:27:00+00:00</dc:date>
    </item>
  </channel>
</rss>
