classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Fix your gutters before looking at the clouds
September 2011, IT infrastructure in security

The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.

If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?

The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.

Cloud computing is no different. Companies surrender their own boreholes


(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.

Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.

At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?

Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?

So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.

This should span your feed from the Internet right through to the network adapters on your PCs.

One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.

http://www.accsys.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Huawei holds Safe City Africa Summit in Cape Town
    June 2015, IT infrastructure in security, Enterprise Solutions, Security Services & Risk Management, Remote Monitoring
    Huawei held its Safe City Africa Summit in Cape Town in April as a platform for more than 400 industry members to share insights, development trends and global success stories on public safety in cities.
  • DEHN launches DC switching device DCD
    June 2015, Security Services & Risk Management, IT infrastructure in security, Products
    Lightning and surge protection expert, Dehn Africa, has launched DEHNguard SE DC, a powerful DC switching device DCD that ensures safe operation.
  • Changing the ­power game
    June 2015, IT infrastructure in security
    Effective data analytics can make the difference between a chaotic scramble and planned, efficient improvement. Now is the ideal time for Eskom to use advanced analytics to improve decision-making and better handle South Africa’s power crisis.
  • Remotely destroy your SSD
    May 2015, IT infrastructure in security
    Waitan announced its StellaHunter series solid state drives (SSD) with its proprietary design of executing military secure erase or self-destruction, or both, via various types of remote control and command methods.
  • Securing the cloud layer by layer
    May 2015, IT infrastructure in security, Enterprise Solutions
    Security has typically been, and continues to be, one of the major areas of concern for organisations contemplating a move into the cloud, and for good reason.
  • Consider all the variables when deciding on storage
    May 2015, WD South Africa, IT infrastructure in security
    With a NAS it’s easy to quickly transfer large amounts of data to the device via the local network, and when people are on the move; this data can be accessed via a desktop or mobile app thanks to the personal cloud feature.
  • New in SA, cloud-based security management system
    May 2015, Security Services & Risk Management, Enterprise Solutions, IT infrastructure in security, Products
    Trackforce is an international provider of security management technology, with a 10-year track record of delivering integrated security solutions to its partners and customers – and it has now arrived in South Africa.
  • Security requires protection
    April 2015, IT infrastructure in security
    Installed in an outdoor location, CCTV cameras are often vulnerable to direct lightning strikes due to their exposed location.
  • Storage solutions for surveillance
    April 2015, WD South Africa, IT infrastructure in security, CCTV, Surveillance
    One thing we can all be sure of is that surveillance installations need to store large amounts of video footage. And as the resolutions of cameras improve, the size of the storage required also increases.
  • Specialised storage for security systems
    April 2015, WD South Africa, IT infrastructure in security
    Using just any hard drive in a DVR can cause catastrophic consequences and is often the single point of failure in security systems, bringing the entire system crashing down.
  • Software defined storage
    April 2015, IT infrastructure in security
    Software defined storage (SDS) is the new buzz phrase in the cloud world and as usual, vendor after vendor is jumping on it. The question is, will software defined storage impact data protection/management?
  • Evolving threats are putting businesses at risk
    April 2015, IT infrastructure in security
    For a country like South Africa that is visibly paranoid about security, the country’s information security landscape is seriously lagging in terms of awareness and practical, relevant application.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.