classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Fix your gutters before looking at the clouds
September 2011, IT infrastructure in security

The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.

If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?

The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.

Cloud computing is no different. Companies surrender their own boreholes


(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.

Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.

At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?

Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?

So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.

This should span your feed from the Internet right through to the network adapters on your PCs.

One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.

http://www.accsys.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Key management in the spotlight
    July 2015, Amaya Industries, Zonke Monitoring Systems, Access Control, Identity Management, IT infrastructure in security
    Key management today is no longer a case of having your secretary keep the keys in her desk drawer and only hand it out to people she considers acceptable. It has become a science.
  • ComNet introduces new CopperLine
    July 2015, ComNet , IT infrastructure in security
    ComNet Europe is introducing major capability upgrades in its all new CopperLine Ethernet over COAX/UTP distance extending product line.
  • Entertainment needs reliable storage
    July 2015, WD South Africa, Entertainment and Hospitality (Industry), CCTV, Surveillance, IT infrastructure in security
    Hi-Tech Security Solutions spoke to Kalvin Subbadu, sales manager for WD Components in South Africa, about the need for adequate recording capacity in the entertainment surveillance sector.
  • APC Smart-UPS
    July 2015, Pelco by Schneider Electric, Products, IT infrastructure in security
    Schneider Electric introduces Smart UPS C, an efficient, true sine-wave power protection for entry-level servers and network equipment.
  • Protection from Clearline
    July 2015, Clearline Protection Systems, Products, IT infrastructure in security
    Clearline has introduced the Duoline series of HD CCTV signal and PSU protectors.
  • Huawei holds Safe City Africa Summit in Cape Town
    June 2015, IT infrastructure in security, Enterprise Solutions, Security Services & Risk Management, Remote Monitoring
    Huawei held its Safe City Africa Summit in Cape Town in April as a platform for more than 400 industry members to share insights, development trends and global success stories on public safety in cities.
  • DEHN launches DC switching device DCD
    June 2015, Security Services & Risk Management, IT infrastructure in security, Products
    Lightning and surge protection expert, Dehn Africa, has launched DEHNguard SE DC, a powerful DC switching device DCD that ensures safe operation.
  • Changing the ­power game
    June 2015, IT infrastructure in security
    Effective data analytics can make the difference between a chaotic scramble and planned, efficient improvement. Now is the ideal time for Eskom to use advanced analytics to improve decision-making and better handle South Africa’s power crisis.
  • Remotely destroy your SSD
    May 2015, IT infrastructure in security
    Waitan announced its StellaHunter series solid state drives (SSD) with its proprietary design of executing military secure erase or self-destruction, or both, via various types of remote control and command methods.
  • Securing the cloud layer by layer
    May 2015, IT infrastructure in security, Enterprise Solutions
    Security has typically been, and continues to be, one of the major areas of concern for organisations contemplating a move into the cloud, and for good reason.
  • Consider all the variables when deciding on storage
    May 2015, WD South Africa, IT infrastructure in security
    With a NAS it’s easy to quickly transfer large amounts of data to the device via the local network, and when people are on the move; this data can be accessed via a desktop or mobile app thanks to the personal cloud feature.
  • New in SA, cloud-based security management system
    May 2015, Security Services & Risk Management, Enterprise Solutions, IT infrastructure in security, Products
    Trackforce is an international provider of security management technology, with a 10-year track record of delivering integrated security solutions to its partners and customers – and it has now arrived in South Africa.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.