Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Fix your gutters before looking at the clouds
September 2011, IT infrastructure in security

The recent media is abuzz with cloud computing in all its forms and permutations. And it has become apparent that, to some degree, each and every one of us will sooner or later be faced with the decision of what cloud services to use, and when to adopt this promising architecture.

If everyone promises cheaper services, more up-time, and most importantly, a reduction in infrastructure costs when using cloud computing, what should the CIO in your company be looking at in preparation for this latest wonder of our IT world?

The answer lies in bottle-necks and redundancy. If I were to build a new house and be completely dependent on rainwater for all my requirements, the first thing I would do is to make sure that there are no bottle-necks in the transfer of water from the catchment area into some form of reservoir. From there, I would have to establish a redundancy system of new, large-diameter water pipes to those areas of my household that will be needing access to the water. In other words – fix up your gutters and increase the size of your water pipes. Remember, in order to run my household, I cannot go without water, and neither do I have my own borehole anymore. (I sold it to buy the new water pipes). So yes, tapping resources from an external provider is definitely more cost effective if you are starting out a new house. Converting an existing household’s water supply to accommodate this new network may require some noticeable investment.

Cloud computing is no different. Companies surrender their own boreholes


(client-based software licenses and services) in order to make use of a resource feed from within the ‘cloud’. As such, the days of using large power-hungry servers in an expensively run air-conditioned room may seem to be numbered. But, as with boreholes, you move the weakness from your own infrastructure to that of the service delivery mechanism. In this instance, your network supply.

Setting up your company with quality network infrastructure, from your local area networks, to your switching systems, domain servers, and routers, is a non-negotiable before committing to cloud services. Similar to tapping water resources from a catchment area via high quality – high capacity gutters, you have to concentrate on redundancy and distribution.

At the moment, there are a number of public cloud solutions that do not allow for online-offline redundancy. In other words, with the exception of a few experimental frameworks – including Google Gears – should one perform mission critical applications on a cloud service, and the connection to the cloud goes offline, you would need to resume on a local instance of that server until the network has been re-connected. And even if this was possible, is it feasible?

Why go to the cloud in the first place if you have to fork out some serious computing power to run the service locally?

So to summarise; initially, one should not see the utilisation of public cloud services as a money saver. Use that infrastructure savings (servers, software licenses, electricity, etc) to spend on upgrading your networking system.

This should span your feed from the Internet right through to the network adapters on your PCs.

One final point on the decision of when to adopt cloud computing: Until your infrastructure has proven itself, limit the usage to services that you can do without for short periods of time. I would be happy to run my mail server in the cloud, but mission critical services which may include accounting, CRM, ERP, etc, will have to wait until I am satisfied that my service provider can deliver on his promises.

http://www.accsys.co.za


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Unpacking the unfashionable infrastructure
    October 2014, Mustek Security Technologies, IT infrastructure in security
    Good security is about more than a solution or an endpoint; it is about having a sound infrastructure in place that is able to support and communicate with the technology.
  • Master Power solar solutions
    September 2014, Industrial (Industry), IT infrastructure in security
    Master Power Technologies has launched a new range of photovoltaic solar solutions to complement its current range of products for use in industrial applications in hot, arid regions, or wherever utility power is expensive or unreliable.
  • Keeping an eye on your data
    September 2014, IT infrastructure in security
    A report by IDC revealed that half of global big data in 2012 came from surveillance. This statistic goes some way to illustrating the scale of the challenge organisations that use surveillance face in both storing and managing it.
  • WD expands NAS storage offerings
    September 2014, IT infrastructure in security
    WD Red now in 6 TB capacities; NASware 3.0 increases NAS system bay count support to eight bays; New WD Red Pro deepens reach into medium to large NAS market.
  • Tips to reduce network congestion
    August 2014, IT infrastructure in security
    IP security footage can travel on the corporate network, but is often banned because it takes so much bandwidth – especially video footage. Exinda offers some tips on improving the performance of your WAN.
  • Guaranteed cellular detection
    August 2014, Enterprise Solutions, IT infrastructure in security
    The CellDetect Solution rests on a few pillars namely prevention, detection, localisation and neutralisation supported by intelligence (research), technical knowledge and training.
  • Hi-tech solutions for new Miro head office
    August 2014, Miro distribution, CCTV, Surveillance, IT infrastructure in security, Case Studies
    Wireless IP convergence company Miro recently installed a converged networking and security solution at its new head office to cater for house security, safety and stock control.
  • Security and cloud computing
    July 2014, Technews Publishing, Security Services & Risk Management, IT infrastructure in security
    Who hasn’t heard of cloud computing, but how secure is your cloud provider and your data, and who is responsible for your data once in the cloud?
  • More than the camera
    July 2014, Syntech, IT infrastructure in security
    WD Purple drives are designed and built with surveillance in mind to ensure faster access, smooth and seamless functionality, and robust operation in a highly demanding environment.
  • Wireless networking solutions from Motorola
    June 2014, Westcon Security Solutions, IT infrastructure in security
    Westcon has announced three new wireless network management solutions from Motorola Solutions, that provide easy migration to the cloud, and a centralised Access Point management model.
  • Switch to Edge-corE
    June 2014, Miro distribution, IT infrastructure in security
    A switch is a switch is a switch, right? Think there is nothing new to learn about switches?
  • Ruggedised switches for industrial applications
    June 2014, Duxbury Networking, IT infrastructure in security
    Duxbury Networking has released two new ruggedised eight-port, Fast Ethernet network switches, designed primarily to complement video surveillance systems in demanding, heavily industrialised environments.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.