Creating Utility-Grade Building Network Infrastructure

| June 14, 2019

article image
There’s a rise in the number of devices being connected to the network in buildings, and the kinds of devices being connected vary widely, from computers and IP phones to cameras, digital signage, and sensors that are part of the Internet of Things (IoT) and the Operational Technology (OT) network. We’re seeing a convergence of these devices on twisted-pair cabling, but the requirements for these devices introduce some variables into the equation that make connections difficult for installers. For example, installers may not be familiar with structured cabling installation practices and how to meet each device’s requirements: some devices may need high power, while others might need low power. Some devices might need high bandwidth, while others might need low bandwidth or any combination thereof.

Spotlight

Ivy Comptech

IVY Comptech Private Limited (IVY) is a group company of a FTSE 100 listed entity - GVC Holdings Plc., (UK). GVC is engaged in providing online and retail gaming in regulated markets, and owns marquee brands such as Bwin, Ladbrokes, Gala Coral, Partypoker, FoxyBingo, Sportingbet, Eurobet etc., IVY provides software services and solutions to the world of digital entertainment with cutting-edge technology, supporting a large scale technical eco-system, with billions of transaction being serviced across 160 countries from a single platform. Our team remotely manages the tech eco-system that powers 4 billion API calls, 10+ billion SQL executions, 10 billion affiliate impressions in a single day.

OTHER ARTICLES

5 TIPS TO ENSURE NETWORK SECURITY OF INTERNAL IT INFRASTRUCTURE

Article | May 3, 2021

What Is IT Infrastructure Security? If you are reading this blog, we would like to assume that you are either an aspiring cybersecurity professional or a business owner looking for ways to improve their network security. A business IT infrastructure includes networks, software, hardware, equipment, and other facilities that make up an IT network. These networks are applied to establish, monitor, test, manage, deliver, and support IT services. So, IT infrastructure security describes the process of safeguarding the core networking infrastructure, and it is typically applied to enterprise IT environments. You can improve IT infrastructure security by installing protective solutions to block unauthorized access, theft, deletion, and data modification.

Read More

Rethinking How We Measure IT Infrastructure Value

Article | February 28, 2020

Planning needs a rethink. Else, IT leaders risk hobbling their companies’ growth potential or becoming blindsided by risks. For many, justifying an IT decision to the CFO or the Board begins with a business case. Often, they use the total cost of ownership (TCO) to convince. Using return on investment (ROI) goes a step further than IT costs and savings, and looks at user efficiency and business effectiveness. Both measures fall short on correctly highlighting the true impact to the business of an enabling technology or infrastructure. Either the metric is too narrow, the timeline is too short, or the investment is not mature enough. It warrants a more holistic approach that looks at multiple aspects of risks, costs and benefits, and compares different components of ROI.

Read More

The world is ready for 5G. Are you?

Article | June 3, 2021

At last, the wait for 5G is nearly over. As this map shows, coverage is widespread across much of the U.S., in 24 EU countries, and in pockets around the globe. The new wireless standard is worth the wait. Compared to 4G, the new wireless standard can move more data from the edge, with less latency. And connect many more users and devices—an important development given that the IDC estimates 152,000 new Internet of Things (IoT) devices per minute by 2025. Put it together, and 5G is a game-changing backhaul for public networks. (Wi-Fi 6, often mentioned in the same breath as 5G, is generally used for private WANs.

Read More

To cloud or not to cloud . . . that shouldn’t be the question

Article | February 24, 2020

In my discussions with clients about their journey to cloud, it’s becoming evident that many of them are viewing cloud as a goal, instead of looking at cloud deployments as a capability. In some cases, line-of-business owners are under corporate pressures to “adopt” a cloud-first strategy. A recent Forrester Consulting study commissioned by IBM, “The Key To Enterprise Hybrid Multicloud Strategy”[1] suggests that “75% [of 350 surveyed global decision makers] have received pushback while advocating for strategies outside of cloud environments.” The result of this, unfortunately, is the lack of continued investment on their on-premises (“on-prem”) environments. From my experience, this type of deployment focus may not yield the expected results. We shouldn’t think about problem solving as “To cloud or not to cloud?” Instead, we should ask ourselves, “What is the problem I’m trying to solve?” and “Are cloud deployments (public or private) going to optimize my solution?”

Read More

Spotlight

Ivy Comptech

IVY Comptech Private Limited (IVY) is a group company of a FTSE 100 listed entity - GVC Holdings Plc., (UK). GVC is engaged in providing online and retail gaming in regulated markets, and owns marquee brands such as Bwin, Ladbrokes, Gala Coral, Partypoker, FoxyBingo, Sportingbet, Eurobet etc., IVY provides software services and solutions to the world of digital entertainment with cutting-edge technology, supporting a large scale technical eco-system, with billions of transaction being serviced across 160 countries from a single platform. Our team remotely manages the tech eco-system that powers 4 billion API calls, 10+ billion SQL executions, 10 billion affiliate impressions in a single day.

Events