Fix your gutters before looking at the clouds
September 2011, IT infrastructure
The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.
If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?
The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.
Cloud computing is no different. Companies surrender their own boreholes
(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.
Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.
At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?
Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?
So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.
This should span your feed from the Internet right through to the network adapters on your PCs.
One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.
- Cloudy with compliance
March 2018, IT infrastructure, Security Services & Risk Management
Companies increasingly turning to cloud for improved security, efficiency and regulatory compliance.
- Can you secure security?
March 2018, Graphic Image Technologies, Cyber Security, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Is it possible to protect physical security systems from cyber intruders? Laurence Smith looks at the task of securing physical security.
- Transforming customer experience in retail
March 2018, Retail (Industry), Integrated Solutions, IT infrastructure
Behind every great consumer experience is a hard-working retail process, of which technology is playing an increasingly effective role.
- The Moon at home
February 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure, Products
World’s first all-in-one smart hub with levitation technology camera to enter into production after a successful crowdfunding campaign.
- Cyberattacks will not go away
February 2018, CA Southern Africa, Cyber Security, IT infrastructure
Cybercrime will continue to grow – the issue for businesses is to determine “do the right people have access to the data they are entitled to access”?
- Hacking public Wi-Fi
February 2018, This Week's Editor's Pick, Cyber Security, IT infrastructure
Public Wi-Fi is great in so many ways. However, as much as we love the convenience, hackers love public Wi-Fi too, and for different reasons.
- Intelligent handles, smart PDUs
February 2018, Netshield, IT infrastructure
With the simple addition of intelligent handles, your cabinets are secured and put control back into the businesses’ hands.
- People on the move
November 2017, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
Sanjay Dharwadker looks at some of the changes that have been enacted to better manage Europe’s borders.
- Home run for integrated security
November 2017, Milestone Systems, Integrated Solutions, CCTV, Surveillance & Remote Monitoring, Access Control & Identity Management, IT infrastructure
Axis Communications, Extreme, Lenel and Milestone team up to secure 2017 Little League Baseball Series.
- Facing the future
November 2017, neaMetrics, Virdi Distribution SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Facial biometrics is coming into its own today, but is it a 100% reliable means of identity verification and authentication?
- A mobile holiday
November 2017, Access Control & Identity Management, IT infrastructure
The use of mobile devices, specifically smartphones for access control has taken off over the past year or two, with expectations that its adoption will grow even more.
- Access a mobile-first world
November 2017, Axis Communications SA, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
Mobile access control enables mobile devices – such as smartphones and wearables – to function as credentials in providing access to secured buildings, rooms and areas.