Showing posts with label Data Center. Show all posts
Showing posts with label Data Center. Show all posts

August 31, 2023

AWS, It's Not Just a Pillow

 

(Credit Photo: Dannielle Blumenthal)
 
Share/Save/Bookmark

February 7, 2016

Cloud Pleasing

Technology vendors have wised-up and are rushing to the cloud to give customers what they want. 

You want cloud?  

You got cloud!

Cloud Computing with the virtually infinite promise for flexible, cost-effective, on-demand computing--all centrally managed by the vendor--you can sleep easy at night, oh baby. 

CIOs love it. 

The only problem as everyone moves to the cloud is the promise of the cloud continues to fall short

Now how unpopular a thing to say is that? 

Take out the guillotine...

Seriously though, it was supposed to be flexible, but it isn't so much as vendors contract with customers for multi-year deals and customers find switching vendors not quite so easy...anyone hear of vendor lock-in?

Also, cloud was supposed to be more cost-effective, but vendors still need to make their margins, so longer commitments, service bundling, minimum fixed costs, and variable month-to-month pricing--sure helps things add BIG DOLLARS for the cloud vendor. 

Then you have vendors that simply call everything cloud...ah, "cloud washing" that is.  If you think you are getting cloud (even if it ain't so much so), yippee are you happy...you have drunk the cool-aid and it is sweet.

Technology leaders swooping into a new job want to come in with a bang..."Hey, look what I did to modernize, transform, reinvent, revolutionize...and save money too--thank G-d, they hired me."

So cloud, cloud, cloud...it sounds so CLOUD PLEASING, I mean crowd-pleasing. 

Whether in the specific situation it's better or not, that's not the point, stupid. 

At least, it's out of our hair--let the vendor worry about it!

One, two, three...everyone say "CLOUD!" ;-)

(Source Graphic: Andy Blumenthal)
Share/Save/Bookmark

March 31, 2012

Which Big Brother

About a decade ago, after the events of 9/11, there was a program called Total Information Awareness (TIA) run out the Defense Advanced Research Projects Agency (DARPA).

The intent was develop and use technology to capture data (lots of it), decipher it, link it, mine it, and present and use it effectively to protect us from terrorists and other national security threats. 

Due to concerns about privacy--i.e. people's fear of "Big Brother"--the program was officially moth-balled, but the projects went forward under other names.  

This month Wired (April 2012) reports that the National Security Agency (NSA) has almost achieved the TIA dream--"a massive surveillance center" capable of analyzing yottabytes (10 to the 24th bytes) of data that is being completed in the Utah desert. 

According to the article, the new $2 billion Utah Data (Spy) Center is being built by 10,000 construction workers and is expected to be operational in a little over a year (September 2013), and will capture phone calls, emails, and web posts and process them by a "supercomputer of almost unimaginable speed to look for patterns and unscramble codes."

While DOD is most interested in "deepnet"--"data beyond the reach of the public" such as password protected data, governmental communications, and other "high value" information, the article goes on to describe "electronic monitoring rooms in major US telecom facilities" to collect information at the switch level, monitor phone calls, and conduct deep packet inspection of Internet traffic using systems (like Narus).

Despite accusations of massive domestic surveillance at this center, Fox News (28 March 2012) this week reported that those allegations have been dismissed by NSA. The NSA Director himself, General Keith Alexander provided such assurances at congressional hearings the prior week that the center was not for domestic surveillance purposes, but rather "to protect the nation's cyber security," a topic that he is deeply passionate about. 

Certainly new technologies (especially potentially invasive ones) can be scary from the perspective of civil liberties and privacy concerns.

However, with the terrorists agenda very clear, there is no alternative, but to use all legitimate innovation and technology to our advantage when it comes to national security--to understand our enemies, their networks, their methods, their plans, to stop them, and take them down before they do us harm.

While, it is true that the same technologies that can be used against our enemies, can also be turned against us, we must through protective laws and ample layers of oversight ensure that this doesn't happen. 

Adequate checks and balances in government are essential to ensure that "bad apples" don't take root and potentially abuse the system, even if that is the exception and not the rule. 

There is a difference between the big brother who is there to defend his siblings from the schoolyard bully or pulls his wounded brother in arms off the battlefield, and the one who takes advantage of them.

Not every big brother is the Big Brother from George Orwell's "1984" totalitarian state, but if someone is abusing the system, we need to hold them accountable. 

Protecting national security and civil liberties is a dual responsibility that we cannot wish away, but which we must deal with with common sense and vigilance.  

(Source Photo: here)

Share/Save/Bookmark

November 27, 2011

Running IT as an Ecosystem

The New York Times (27 November 2011) has an interesting article under "bright ideas" called Turn on the Server. It's Cold Outside.
The idea in the age of cloud and distributed computing, where physical location of infrastructure is besides the point, is to place (racks of) servers in people's homes to warm them from the cold.
The idea is really pretty cool and quite intuitive: Rather than use expensive HVAC systems to cool the environment where servers heat up and are housed, instead we can use the heat-generating servers to warm cold houses and save money and resources on buying and running furnaces to heat them.
While some may criticize this idea on security implications--since the servers need to be secured--I think you can easily counter that such a strategy under the right security conditions (some of which are identified in the article--encrypting the data, alarming the racks, and so on) could actually add a level of security by distributing your infrastructure thereby making it less prone to physical disruption by natural disaster or physical attack.
In fact, the whole movement towards consolidation of data centers, should be reevaluated based on such security implications. Would you rather have a primary and backup data center that can be taken out by a targeted missile or other attack for example, or more distributed data centers that can more easily recover. In fact, the move to cloud computing with data housed sort of everywhere and anywhere globally offers the possibility of just such protection and is in a sense the polar opposite of data center consolidation--two opposing tracks, currently being pursued simultaneously.
One major drawback to the idea of distributing servers and using them to heat homes--while offering cost-saings in term of HVAC, it would be very expensive in terms of maintaining those servers at all the homes they reside in.
In general, while it's not practical to house government data servers in people's homes, we can learn to run our data centers more environmentally friendly way. For example, the article mentions that Europe is using centralized "district heating" whereby more centralized data center heat is distributed by insulated pipes to neighboring homes and businesses, rather than actually locating the servers in the homes.
Of course, if you can't heat your homes with data servers, there is another option that gets you away from having to cool down all those hot servers, and that is to locate them in places with cooler year-round temperatures and using the areas natural air temperature for climate control. So if you can't bring the servers to heat the homes, you can at least house them in cold climates to be cooled naturally. Either way, there is the potential to increase our green footprint and cost-savings.
Running information technology operations with a greater view toward environmental impact and seeing IT in terms of the larger ecosystem that it operates in, necessitates a careful balancing of the mission needs for IT, security, manageability, and recovery as well as potential benefits for greater energy independence, environmental sustainability, and cost savings, and is the type of innovative bigger picture thinking that we can benefit from to break the cycle of inertia and inefficiency that too often confronts us.
(Source Photo: here)

Share/Save/Bookmark

December 10, 2010

Federal IT Management Reform

New IT management reform from the White House.

Very exciting development.

The plan is published at this link.

Share/Save/Bookmark

February 2, 2008

IT Consolidation adds Up To Cost Savings and Enterprise Architecture

For CIOs, one of the secrets of the trade for building cost efficiency is consolidation of IT assets, such as data centers and help desks. Of course, to accomplish this you need to executive commitment and user buy-in.

The Wall Street Journal, 29 January 2008, reports that “H-P Hits Snag in Quest for Savings through System Consolidation.”

“Since July 2005 [the Compaq merger]…the firm [HP] has been in a project to cut the number of computer program is uses by more than half [from 6000 to 1600], and reduce the number of its data centers…to six from 85.”

Have the benefits of consolidation been documented?

In a survey of 1500 CIOs by Gartner last year, “reducing costs through IT consolidation and other means is one of their top ten priorities.”

Further, according to Forrester Research, “the benefits can be significant” In a survey, last fall, of eight companies that consolidated IT, “nearly all ‘lowered …overall operational costs by at least 20%.’”

What are some of the critical success factors?

  1. User buy-in—“vice president often aren’t used to taking order from the chief information officer on what computer programs they can use. ‘It’s about politics.’” The way to get around this and develop buy-in is to set the targets with the CEO and CFO, but let the users decide which systems to keep and which to fold into the consolidation.
  2. Executive commitment— “The solution is to get management support from the top. ‘Getting the CEO lined up is hard, and that’s the key person.’” At HP the CEO “threatened some with termination” that didn’t follow along with his commitment to consolidate.

From a User-centric EA perspective, IT standardization, consolidation, and cost efficiency are important goals. Of course, this needs to be done in the context of developing a sound, secure, reliable, state-of-the-art IT infrastructure. Achieving cost effectiveness must involve building enterprise solutions, merging disparate data centers and help desks, consolidated purchasing, and otherwise standardizing products and streamlining operations. Of course, user buy-is a prerequisite when using a User-centric EA approach.


Share/Save/Bookmark