Fix your gutters before looking at the clouds
September 2011, IT infrastructure in security
The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.
If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?
The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.
Cloud computing is no different. Companies surrender their own boreholes
(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.
Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.
At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?
Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?
So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.
This should span your feed from the Internet right through to the network adapters on your PCs.
One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.
- Seven video surveillance trends you can’t afford to overlook
May 2016, Seagate Technology, CCTV, Surveillance & Remote Monitoring, IT infrastructure in security
Do you know what’s next for video surveillance? It’s an incredibly dynamic industry that continues to grow at an exponential rate.
- City surveillance: 20 years later
May 2016, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure in security, Security Services & Risk Management, This Week's Editor's Pick
Twenty years down the line and having completed many city surveillance systems and expansions thereof, we find ourselves questioning the technical, operational, legal and maintenance methodologies followed in southern Africa.
- Automated analytics with iSentry
May 2016, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure in security
Hi-Tech Security Solutions was given an introduction to iSentry, a local video analytics system that specialises in self-learning rather than pre-programmed, rule-based analytics.
- Storage: what is the right choice?
May 2016, Geutebrück SA, CCTV, Surveillance & Remote Monitoring, IT infrastructure in security
The requirements for video surveillance are continually on the rise. Evermore, cameras, higher resolutions and longer retention times are increasing the demand for storage systems.
- Converged data centres
May 2016, CCTV, Surveillance & Remote Monitoring, IT infrastructure in security
Hyperconvergence may benefit integrators involved in large surveillance installations and need a simplified data centre approach.
- Video management in the age of the mobile Internet
May 2016, Milestone Systems, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure in security, This Week's Editor's Pick
Mobility is radically changing the way that business systems operate, enhancing the value of video and providing visual awareness at the edge of the network.
- The power must flow
May 2016, Legrand Southern Africa, IT infrastructure in security, Products
Power solutions ensure protection of electrical equipment and continuity of service during planned and unexpected power outages.
- Disaster recovery not a sideline
May 2016, Security Services & Risk Management, IT infrastructure in security
Organisations need to move away from treating business continuity and disaster recovery as isolated IT conversations.
- Test your surge
May 2016, DEHN Africa, IT infrastructure in security
As with all electrical and electronic devices, components of surge protective devices are also subject to ageing.
- Offline control for hosted access
May 2016, Johnson Controls, Access Control & Identity Management, IT infrastructure in security
Cloud-based identity and access control (IAC) makes great sense, until you lose connectivity. Johnson Controls’ P2000 provides seamless ID management, online and offline.
- NVRs move away from Windows
May 2016, IP Video Solutions, CCTV, Surveillance & Remote Monitoring, IT infrastructure in security
The trend towards dedicated network video recorder (NVR) platforms is continuing.
- Storage designed for surveillance improves the entire system
May 2016, WD South Africa, CCTV, Surveillance & Remote Monitoring, IT infrastructure in security
The right surveillance storage solution should offer high performance, efficiency and capacity that has been tested in harsh surveillance environments.