Database manageability: Getting Ahead of the curve

According to IOUG survey demand for database services is rapidly increasing, but outdated management methods and explosive data growth are leaving database administrators feeling outpaced.

Spotlight

BrightGen

When Rob Stevens and Martin Tyte formed BrightGen in 2006, their vision was to create a new IT services company with a proven approach, working alongside a set of unique values, delivering Business Solutions on the latest Cloud Delivery model. During their careers they observed how legacy on premise solutions left the internal business teams frustrated. This frustration spanned all aspects of the business especially Sales, Marketing Customer Services, Finance and Product Creation as they felt constrained due to lack of flexibility, cost of change, capital and operation costs, lack of innovation, loss of revenue and a general sense of missing business opportunities. It became clear that there was a huge need for a different approach.

OTHER ARTICLES
Application Storage, Data Storage

How to backup hyperconverged infrastructure

Article | July 12, 2023

Enterprises running hypervisors on hyper-converged infrastructure (HCI) systems typically have backup options available to them that are not available to those running on generic hardware. Such customers may also have additional backup challenges depending on the HCI vendor and hypervisor they have chosen. Let’s take a look.

Read More
Hyper-Converged Infrastructure, IT Systems Management

What Is IaaS? A Data Center in the Cloud Packed with Services

Article | September 14, 2023

Consider IaaS (infrastructure as a service) as a virtual version of your traditional data center. IaaS is a branch of cloud computing technology that offers virtualized storage, server, and networking wrapped together as a self-service platform. It is highly cost-efficient and makes up for easier, faster workloads. Although incredibly convenient for business, it largely depends on what your company needs to use it for. What is IaaS, and How Can It Benefit Your Business? IaaS first rose to popularity in the early 2010s. Since then, it has become the standard abstraction model for many types of workloads. But with the rise of the microservices application pattern and the arrival of new technologies like containers and serverless IaaS is still a foundational service, but the field is more crowded than ever. The most common household cloud computing names—AWS (Amazon Web Services), Google Cloud and Microsoft Azure— are all IaaS providers. They all maintain giant data centers around the globe. It includes tons of storage systems, physical servers, and networking equipment under a virtualization layer. Cloud customers access these resources to deploy and run applications in a highly automated manner. Developing a cloud adoption strategy is a vital step forward for modern-day business. And this subscription-based cloud computing service, IaaS, offers a remote management solution and reduces your purchase cost at the same time. Additionally, IaaS also provides key solutions vital for any company’s future plans, such as big-data analysis. It allows businesses like yours to analyze massive data sets and see future trends, patterns, and associations that a human wouldn’t. Understanding the IaaS Architecture In an IaaS service model, your cloud provider will take over your infrastructure components, such as traditional on-premises data centers and host them on the internet. This includes virtual computing, servers, networking hardware, and infrastructure components, as well as the hypervisor layer. IaaS service providers will also provide a wide array of services to accompany those infrastructure components. Monitoring Detailed billing Security Log access Load balancing Clustering Storage resiliency Backup Replication Disaster Recovery IaaS services are automated and highly policy-driven, so you can implement all your infrastructure tasks effortlessly. How Does It Work? IaaS customers access their resources through a WAN (wide area network). Leveraging the cloud provider's services, they will install the remaining elements of an application stack. For example, you can log in to the IaaS platform to create VMs (virtual machines), install operating systems on each VM, deploy middleware like databases, create storage buckets for workloads and backups, and install the enterprise workload on that VM. Afterward, you can also use the IaaS provider's services to track costs, balance network traffic, monitor performance, troubleshoot application-related issues and manage disaster recovery. IaaS Use Cases As IaaS provides general-purpose computing resources, it can be used for any kind of use case. IaaS is most often used today for the development and testing environments, websites, and web apps that interact with customers, data storage, analytics, and data warehousing workloads. Plus, it also offers backup and disaster recovery services, especially for on-premises workloads. IaaS is also a good way to set up and run common business software and apps like SAP. Real-life Examples GE Healthcare: Reputed medical imaging facility GE Healthcare adopted Amazon EC2 from AWS to design the GE Health Cloud. GE Health Cloud platform successfully empowered its consumers by collecting, storing, accessing, and processing information worldwide from different types of medical devices to obtain value from data. Coca-Cola: The beverage giant Coca-Cola collaborated with SoftLayer adopting a pay-as-you-go architecture to manage their CRM system effectively during peak seasons. Final Thoughts Before choosing a provider, you will need to think carefully about the services, reliability, and costs. First, you should thoroughly assess the capabilities of your organization’s IT department and determine how well equipped it is to deal with the ongoing demands of IaaS implementation. Accordingly, you will be prepared to choose an alternative provider and move to the alternative infrastructure if you need to.

Read More
Hyper-Converged Infrastructure

Securing the 5G edge

Article | September 14, 2023

The rollout of 5G networks coupled with edge compute introduces new security concerns for both the network and the enterprise. Security at the edge presents a unique set of security challenges that differ from those faced by traditional data centers. Today new concerns emerge from the combination of distributed architectures and a disaggregated network, creating new challenges for service providers. Many mission critical applications enabled by 5G connectivity, such as smart factories, are better off hosted at the edge because it's more economical and delivers better Quality of Service (QoS). However, applications must also be secured; communication service providers need to ensure that applications operate in an environment that is both safe and provides isolation. This means that secure designs and protocols are in place to pre-empt threats, avoid incidents and minimize response time when incidents do occur. As enterprises adopt private 5G networks to drive their Industry 4.0 strategies, these new enterprise 5G trends demand a new approach to security. Companies must find ways to reduce their exposure to cyberattacks that could potentially disrupt mission critical services, compromise industrial assets and threaten the safety of their workforce. Cybersecurity readiness is essential to ensure private network investments are not devalued. The 5G network architecture, particularly at the edge, introduces new levels of service decomposition now evolving beyond the virtual machine and into the space of orchestrated containers. Such disaggregation requires the operation of a layered technology stack, from the physical infrastructure to resource abstraction, container enablement and orchestration, all of which present attack surfaces which require addressing from a security perspective. So how can CSPs protect their network and services from complex and rapidly growing threats? Addressing vulnerability points of the network layer by layer As networks grow and the number of connected nodes at the edge multiply, so do the vulnerability points. The distributed nature of the 5G edge increases vulnerability threats, just by having network infrastructure scattered across tens of thousands of sites. The arrival of the Internet of Things (IoT) further complicates the picture: with a greater number of connected and mobile devices, potentially creating new network bridging connection points, questions around network security have become more relevant. As the integrity of the physical site cannot be guaranteed in the same way as a supervised data center, additional security measures need to be taken to protect the infrastructure. Transport and application control layers also need to be secured, to enable forms of "isolation" preventing a breach from propagating to other layers and components. Each layer requires specific security measures to ensure overall network security: use of Trusted Platform Modules (TPM) chipsets on motherboards, UEFI Secure OS boot process, secure connections in the control plane and more. These measures all contribute to and are integral part of an end-to-end network security design and strategy. Open RAN for a more secure solution The latest developments in open RAN and the collaborative standards-setting process related to open interfaces and supply chain diversification are enhancing the security of 5G networks. This is happening for two reasons. First, traditional networks are built using vendor proprietary technology – a limited number of vendors dominate the telco equipment market and create vendor lock-in for service providers that forces them to also rely on vendors' proprietary security solutions. This in turn prevents the adoption of "best-of-breed" solutions and slows innovation and speed of response, potentially amplifying the impact of a security breach. Second, open RAN standardization initiatives employ a set of open-source standards-based components. This has a positive effect on security as the design embedded in components is openly visible and understood; vendors can then contribute to such open-source projects where tighter security requirements need to be addressed. Aside from the inherent security of the open-source components, open RAN defines a number of open interfaces which can be individually assessed in their security aspects. The openness intrinsically present in open RAN means that service components can be seamlessly upgraded or swapped to facilitate the introduction of more stringent security characteristics, or they can simultaneously swiftly address identified vulnerabilities. Securing network components with AI Monitoring the status of myriad network components, particularly spotting a security attack taking place among a multitude of cooperating application functions, requires resources that transcend the capabilities of a finite team of human operators. This is where advances in AI technology can help to augment the abilities of operations teams. AI massively scales the ability to monitor any number of KPIs, learn their characteristic behavior and identify anomalies – this makes it the ideal companion in the secure operation of the 5G edge. The self-learning aspect of AI supports not just the identification of known incident patterns but also the ability to learn about new, unknown and unanticipated threats. Security by design Security needs to be integral to the design of the network architecture and its services. The adoption of open standards caters to the definition of security best practices in both the design and operation of the new 5G network edge. The analytics capabilities embedded in edge hyperconverged infrastructure components provide the platform on which to build an effective monitoring and troubleshooting toolkit, ensuring the secure operation of the intelligent edge.

Read More

Cartesi creates Linux infrastructure for blockchain DApps

Article | April 20, 2020

DApps (sometimes called Dapps) are from the blockchain universe and so, logically, the apps part stands for application (obviously) and the D part stands for decentralised (only obvious once you know that we’re talking distributed immutable language here). According to the guides section at blockgeeks, DApps are open source in terms of code base, incentivised (in terms of who validates it) and essentially decentralised so that all records of the application’s operation must be stored on a public and decentralised blockchain to avoid pitfalls of centralisation. So then, Cartesi is a DApp infrastructure that runs an operating system (OS) on top of blockchains. The company has now launched a more complete ‘platform-level’ offering, which is described as a layer-2 solution

Read More

Spotlight

BrightGen

When Rob Stevens and Martin Tyte formed BrightGen in 2006, their vision was to create a new IT services company with a proven approach, working alongside a set of unique values, delivering Business Solutions on the latest Cloud Delivery model. During their careers they observed how legacy on premise solutions left the internal business teams frustrated. This frustration spanned all aspects of the business especially Sales, Marketing Customer Services, Finance and Product Creation as they felt constrained due to lack of flexibility, cost of change, capital and operation costs, lack of innovation, loss of revenue and a general sense of missing business opportunities. It became clear that there was a huge need for a different approach.

Related News

Internet of Things Architecture and Infrastructure Report 2017: Will Support Robust IoTDaaS & be of Paramount Importance for all Industry Verticals

Research and Markets | August 22, 2017

Internet of Things (IoT) networks and systems require support of data management systems, application programming interfaces (API), and software. One of the most important outcomes of this architecture is infrastructure designed to provide IoT Data as a Service (IoTDaaS), which constitutes retrieving, storing and analyzing information from IoT systems.The convergence of Cloud, Data Management, IoT Platforms and Solutions is enabling the next evolution of data analytics in which enterprise will realize significant tangible and intangible benefits from IoT data. The ability to sort data in a raw format, store it in different structural formats, and subsequently release it for further analytics, will support robust IoTDaaS and be of paramount importance for all industry verticals.

Read More

Web scale IT Market expected to reach market size of USD 640 Million by 2022 with CAGR of 17%

EIN News | January 16, 2017

Web scale IT Market is expected to grow at CAGR of ~17% during the forecast period and expected to reach market size of USD ~640 Million by the end of forecast period. The growth is majorly attributed to reduced cost of database infrastructure due to cost efficient cloud based solutions. However, low performance of storage infrastructure and threat of data security especially small enterprises are taking less initiative in adopting web scale IT technology.

Read More

SQL Server's Servicing Rules Have Changed

March 30, 2016

Microsoft has dramatically changed the support policy for SQL Server. In the past, the policy was essentially "wait for a service pack unless you have a problem". The flaw in this thinking is that DBAs and developers often don't know when a problem solved by the CU was affecting their servers. Working under an assumption that any performance degradation or unexpected downtime is caused be a flaw in their own designs, they may wait months for a service pack when the problem is easily solved.

Read More

Internet of Things Architecture and Infrastructure Report 2017: Will Support Robust IoTDaaS & be of Paramount Importance for all Industry Verticals

Research and Markets | August 22, 2017

Internet of Things (IoT) networks and systems require support of data management systems, application programming interfaces (API), and software. One of the most important outcomes of this architecture is infrastructure designed to provide IoT Data as a Service (IoTDaaS), which constitutes retrieving, storing and analyzing information from IoT systems.The convergence of Cloud, Data Management, IoT Platforms and Solutions is enabling the next evolution of data analytics in which enterprise will realize significant tangible and intangible benefits from IoT data. The ability to sort data in a raw format, store it in different structural formats, and subsequently release it for further analytics, will support robust IoTDaaS and be of paramount importance for all industry verticals.

Read More

Web scale IT Market expected to reach market size of USD 640 Million by 2022 with CAGR of 17%

EIN News | January 16, 2017

Web scale IT Market is expected to grow at CAGR of ~17% during the forecast period and expected to reach market size of USD ~640 Million by the end of forecast period. The growth is majorly attributed to reduced cost of database infrastructure due to cost efficient cloud based solutions. However, low performance of storage infrastructure and threat of data security especially small enterprises are taking less initiative in adopting web scale IT technology.

Read More

SQL Server's Servicing Rules Have Changed

March 30, 2016

Microsoft has dramatically changed the support policy for SQL Server. In the past, the policy was essentially "wait for a service pack unless you have a problem". The flaw in this thinking is that DBAs and developers often don't know when a problem solved by the CU was affecting their servers. Working under an assumption that any performance degradation or unexpected downtime is caused be a flaw in their own designs, they may wait months for a service pack when the problem is easily solved.

Read More

Events