awasanawantha aranchiya | cloud computing technology





A Hybrid Cloud Quickie


Today I'm looking briefly at the usefulness of a hybrid cloud solution for your business. Hybrid cloud can benefit organizations, primarily by removing the burden of certain operational challenges facing businesses.

Let’s take disaster recovery as our first example. one among the most important advantages cloud environments have in comparison to on-site technology is their resiliency – being cloud-hosted provides unparalleled safety with regard to office-based disasters. With the hybrid extension of the info center model, choices are often made on the situation about levels of resiliency, and also round the replication of your IT enterprise environment to alternate locations. If your office burns down, and your data is stored elsewhere, your business isn’t getting to suffer anywhere near the maximum amount as if you had lost everything.

For example, if a business is regulated by an administration like the FCA for financial institutions, disaster recovery is mandatory. the extent of canopy required differs counting on the actual markets that are operated within.

The office might be located within the guts of any financial district, with its technology centralized during a data center environment. This successively can have replication partners hosting in other data centers, at other geographic locations, even in several countries. This replication is ensuring if a disaster did indeed happen, choices are often made on whether your IT resumption is often established, and if so, how quickly. 

Another exemplar of hybrid cloud is collaboration B2B opportunities. With the emergence of software-defined networking, additional services are often delivered from an equivalent data center, or maybe from other providers that have niche services for your business. during this model anything, ‘aaS’ are often delivered securely from independent software providers and IT Hosting companies, also as other firms which will well enjoy business to business collaboration.

Now let’s check out some samples of this type of hybridization in action. 

Example one would be a business hosting their core infrastructure within a knowledge center and having a requirement for a selected business application that's delivered from just one provider, and not through a SaaS model. Being involved during a hybrid B2B collaboration means they might still be ready to access their application, despite the shortage of SaaS. 

Example two would be a selected sort of recruitment packaged application. A secure networking connection might be employed through the utilization of hybrid cloud connectivity services – simply extending the enterprise to the independent software provider's infrastructure with a simple way of deploying, monitoring, and managing the method.

And finally, example three of the hybrid cloud model’s usefulness is its ability to rework application delivery with disparate data access. Several models that utilize this method exist already today within the emerging application marketplace stores. These cloud marketplaces are almost like the only too familiar smartphone application stores.

Looking at hybrid through another lens, imagine that thanks to restrictive data sovereignty laws it's mandatory that private data has got to reside within your country of residency (fast becoming a reality for a few within the EU). However, the applications, specialist IT infrastructure, and key business services you would like aren't available within your territory. this is able to pose a true business challenge for any organization. Online application marketplaces publishing thousands of applications from overseas locations are helping to avert these issues. Through the use of hybrid networking techniques linking local provisioning of knowledge and storage resources to the specified marketplace applications, acceptable governance is often achieved.

This is similarly true for onboarding applications to a business marketplace from a vendor's standpoint. one independent software vendor based from one location could achieve global status quite literally overnight by being present during a marketplace. 

So, when used appropriately, the Hybrid Cloud model may be a true business enabler, complementing key business services and in line with the pliability that clouds promises

Top Trends and ideas for 2015

Previously we’ve spoken about the highest technology for 2015, so now we’re getting to check out the trends and ideas that are coming into the forefront of our vision. 2014 saw the increase of massive data as a trend within the tech world, the longer term is basically moving more towards the ways during which we'll analyze and use the info that we've collected.

Trend – Commodity analytics

Advanced, Pervasive, and Invisible Analytics, Gartner calls it; I say Commodity Analytics and that I stand by this. I’m not cheapening the hypercomplex and fine work done by the software and data scientists, if anything they need to do such an honest job of unlocking and demonstrating the worth inside everyone’s data that we all need a piece of it.

Whether I would like to understand where I represent profile views inside my LinkedIn network, or what could be a subsequent big technology trend supported 1,000,000 value sales report from 2014. Analytics, within the broadest sense of the word, is more and more a neighborhood of our lives.

I was reminded to what level recently once I opened my phone and checked the weather for London and was presented with an easy icon representing that it had been getting to be dismal. However, upon brooding about what that symbol represents from an analytics perspective, I soon cheered up. The crunching of 1000s of sensors, past and present weather data for this point of the year, plus satellite and radar inputs all on one among the world's most powerful computers.

I then checked the travel route I used to be planning on taking, once more not great, but this was supported by real-time traffic information from speed sensors along a stretch of 250 miles of the united kingdom giving me a near minute perfect estimation of my journey. I got out of bed with a renewed vigor.

All this demonstrates analytics is becoming truly commoditized. not the preserve of the enterprise boardroom, this technology is now feeding everyone all the time to assist them to make better micro-decisions, also as major ones. Do I take a coat or not? Do I'm going on the M1 or the A1? This all helps make Analytics a much bigger slice of the IT-sphere and whatever we thought we knew about the analytics market in 2014 is going to be child’s play compared with 2015.

Trend – Computing everywhere

The saying wont to be, “That calculator has more power than it took to send men to the moon.” Now the old saying is, “That cheap, relatively low-end smart device has more power than my top of the range laptop 2 years ago.” Computing power is everywhere and therefore the proliferation of high-powered mobile computing has helped to offer application developers far more freedom when developing mobile apps. Dual-core chips became commonplace alongside upwards of 2GB RAM and even 128GB flash disks in phones.

What does this mean for the IT industry? Simple, mobile computing and mobile because the primary business tool is now the truth, if you don’t have a fanatical mobile app to mirror/complement your on-premise or cloud-delivered service, you'll be left behind.

The only thing that’s letting these devices down (more than battery life) is that the mobile networks they now depend on. they're not fast enough; don’t have enough throughput or enough coverage. But I'm not one for just complaining; this is often where the chance lies, building mobile apps that give the sensation of real-time whilst using what little bandwidth they need while counting on the local computing power and storage to cache and process information which is bound for the cloud are often the intermediary step.

Trend – Commoditisation of development

As infrastructure skills become obsolete, the IT department is evolving into a development house. Development isn’t the ‘dark art’ it wont to be, with the united kingdom government stating that coding classes will start at 4 years old from 2015; the sole way is ‘up’ for the number and quality of developers within the UK’s future.

In the here and now, and therefore the next year specifically, we will expect to ascertain development becoming far more commonplace within the SME. an honest question is what is going to they do? As supply chains become more complex and time-to-productivity becomes more and more important, developers can help organizations to realize a competitive edge by developing systems that allow them to: react quicker, deliver sooner, and be better informed than their competition.

How do they achieve this? Well once you are ranging from a blank sheet of paper the planet really is your oyster. the simplest thing is that in most cases an organization gains this competitiveness for fewer than buying the equivalent off-the-shelf product, including the lower costs of maintaining the software.

Don’t get me wrong it isn’t as easy as I even have just made it sound. the event function in an organization requires an ecosystem of individuals. Strong project management is critical, developer operations (DevOps) personnel, but done properly the ROI of this model is often the difference between a corporation being relevant in 2016 or not.

Concept – Hybrid cloud

Cloud computing is worth $121bn. Hybrid cloud’s predicted worth is $1.85tr by 2017, accounting for 50% of all it’s spending consistent with Gartner.

Hybrid cloud, love the name or hate it, is here and it’s getting to be the large cloud enabler of 2015. As CIOs search for the way to make cloud (and I mean “public” cloud) a neighborhood of their architectures, hybrid goes to be that way.

Hybrid cloud will enable cloud bursting for computing and storage, and with Software Defined Infrastructure (SDI) to smooth the network, shared systems and security governance will allow this to be achieved using simply a couple of clicks. However, a couple of things will be got to be overcome, the primary one and therefore the biggest being cost!

One of the contributors to confusion within the cloud has been the perception that it's fundamentally cheaper than on-premise. this will be true, but rarely, because it can often have initially higher costs of implementation. to actually cash in on the cloud you ought to take the time to re-engineer your application's architecture. This sounds scary but isn’t. Secondly the disservice a number of the OS migration tool vendors have done to form enterprises think that they will just lift and shift their operating systems driver, apps, security, and everyone into the cloud.

The very thought sends shivers down my spine! When moving to the cloud the primary thing I tell anyone is. “The cloud isn't a 1 size fit solution.” the primary thing to try to identify what's cloud-ready and what isn’t. this may assist you to start out to understand the true benefits and disadvantages of the cloud.

Understand what the cloud offers your applications (or even single elements of your applications), which of them should be within the cloud, which of them shouldn’t, then architect for this. information technology degrees Once you are doing, the hybrid cloud becomes your gateway to the simplest service delivery with highly resilient infrastructure, near unlimited scale (dependent on provider), and spin-up spin-down commercial flexibility.

Concept – Cloud/client architecture

Client/Server you’re so 1990s…

Client/cloud architecture is becoming more and more prevalent within the times of application delivery. check out salesforce.com, Dropbox, office365 to call but a couple of. I'm aware they need servers within the rear, but the purpose is that enterprises are not any longer connecting to a fanatical server, IP address, or, even in most cases, URL. It’s shared on a huge scale and delivers to the mobile device on demand anywhere at any time. Benchmarks of an honest hosting provider

Horse meat burger, cod, and chips, a bacon sandwich, cloud hosting providers… which is that the odd one out? The bacon sandwich, of course.

Last year’s well-publicized food scares aside, the purpose is that always products aren't quite what they appear. So within the list above, why is that the bacon sandwich the odd one out? Well, to date, we've yet to ascertain a successfully counterfeited Bacon sandwich on the market. Often cloud computing hosting providers also are almost what they appear. many promises are made on websites on how good a service is, but on further exploration is that the service actually what it seems? it's useful to explore a number of them.

99.9999% or 100% uptime guarantee

A Service Level Agreement (SLA) may be a measure of availability, which is usually described through percentage statements like 99.999% SLA. When these statements are explored in real-time, this is often the outcome: This information is all excellent, but without watching the fine print it's actually a meaningless and empty promise on the part of the provider. Failure to satisfy an SLA is typically backed by a penalty clause and penalties as an industry-standard aren't normally too onerous for service providers. Traditionally, the provider gives a percentage of the general monthly fee back to the user, counting on the length of the outage. Below may be a table showing what a customer could commonly expect to reclaim: Other important factors to notice when looking into the SLA include:

1. The penalty often doesn't ask for the service as an entire. Your business may have an internet server but the SLA may only be for either network or server availability, therefore the incontrovertible fact that your website isn't working might not be relevant.

2. The advertised SLA doesn't actually match the penalty clause. for instance, your business may are told it'll receive 99.999% availability but the penalty clause starts at 99% availability, so you'd never be fully compensated.

3. it's also important to explore what period of time the penalty is measured over. it's common that providers use a period of 12 weeks, which actually means on a 99% SLA that your business might be offline for 21.6 hours, or on a 99.9% SLA just over 2 hours and still be within the service level.

4. How is that the availability measured? Monitoring commonly checks servers at various intervals, e.g. every quarter-hour, every 5 minutes, or every minute. supported these tests, short outages may often go unnoticed and it's often impractical to see with a better frequency. 99.999% uptime checked every minute will mean that only longer outages are going to be spotted or that a brief 2-second glitch will show up as a moment long outage.

5. it's usually the customer’s responsibility to request service credit checks and SLA’s are therefore not an honest thanks to determining the standard of service.

Unlimited bandwidth included or 1000 GB bandwidth included

What do these statements actually mean? Well, they might mean any number of things, and statements like these often have an * next to them, referring you to a suitable use policy where they really restrict you to 400GB of throughput. However, more often the most important concern is really how quickly you'll get this bandwidth, how big is that the Internet connection?

To illustrate this further, if we equate Water to Internet traffic and a Hose Pipe to the web connection, the most important pipe will move more water and it really doesn't matter if your contract allows you to maneuver a gallon of water or not. If the Pipe can only move three gallons and you're sharing it with 1,000 people then internet results are going to be a negative experience.

We have ISO 27001 for information security

There are few points which you would like to understand about ISO 27001. Firstly it's an information security management system (ISMS) which suggests that it's a framework for managing security, it's not a type that ensures that an organization is really secure. Only standards like PCI actually provide any guarantees, as they're prescriptive about processes, not just suggestive.

Due to the very fact that it's a system, people can just buy an off the shelf set of processes and procedures and quickly demonstrate an ISMS without actually really properly implementing it. However, there are some new legislation guidelines being released soon, which can mean that the auditor is going to be paying much more attention to the ‘monitor and measurement’ section which can hopefully improve things.

When you set up an ISMS the business also sets the scope of the system and a few Cloud providers are known to use this to their advantage. for instance, the business could limit the system scope to the ‘spare parts’ management element of the business then publicly broadcast that it's IS0 27001 compliant but conveniently not mention rebuke. There are positive and negative elements to IS0 27001 and although it's an honest indicator of the strengths of a hosting provider, you clearly got to ask quite “do you've got an IS0 27001 accreditation?”

See terms and Conditions

Remember, what a business offers on the web site isn't necessarily what you get. as an example, I recently witnessed a corporation offering a Hosted Email solution and on its homepage, the provider boldly stated that they offered a free backup service. I couldn't find this mentioned anywhere else on the website and after further inspection, I discovered that their terms and conditions actually stated that backup wasn't included within the service unless expressly mentioned in your selected email package. I will be able to allow you to draw your own conclusions on this.

Your business must check the terms and conditions closely so as to explore the complete nature of the service being provided, particularly on longer contracts. you'll check-in for a service that allegedly offers UK hosting on dedicated hardware, fully IS0 27001 audited facilities, but if the supplier then decides that they wished to migrate over to Amazon Web service, you'll not be ready to legally stop him. Equally, you'll be contractually obliged to still use the service no matter any changes. Contracts should give your business the proper to cancel if there's any fundamental change to the character of the service delivery.

You are nearly always ultimately responsible for your own data and most contracts will state that the service provider shall not be liable for loss or corruption of knowledge or information. this is often not necessarily because they're a poor provider but actually because it's hard, if not impossible, to urge insurance against that sort of loss – especially when it's so difficult to put a worth on data.

I hope that by reading this blog you've got realized that it's easy for providers to cover behind the web world during which we sleep, so closely check what you're buying. simply because the web site looks good and you recognize the brand, it doesn't guarantee that you simply receive the extent of service which you're expecting. it's also important to recollect that a lot of the technologies utilized in the Cloud is new and long-standing, strong brands also will be new to these technologies, and their previous ethos might not necessarily add to the new Cloud world. Many companies historically may be excellent at providing break-fix style contracts, but can they stop things breaking within the first place?

Originally published on Compare the Cloud 16 April 2013 as What makes a top-quality Cloud hosting provider? by Richard May.

Concept – SDE Software Defined Everything

Software-defined data centers appeared to come aged last year, by this I mean, within the world of the SME. It’s the standard story of a product pioneered thanks to a specialist need, during this case the necessity of Internet-scale companies, namely NASA and Rackspace. Open-sourced, then rapidly developed too far beyond the specified capabilities, then adopted by the MSP world at large.

Over a previous couple of years, all the massive vendors have developed a play of some description. The project as an entire has matured dramatically. Services companies like Mirantis have sprung up to supply professional services around the technology. All of this helps to de-risk and make adoption easy and straight-forward for the top customers that are getting to turn it from the top of the CIO agenda to defacto within the SME datacenter.

Concept – Risk-based security and self-protection

To maintain a secure open and secure cyberspace we must look to new methods that will keep us before the threats in 2015. we've already seen cyberweapons developed which derailed Iran’s nuclear program by 2 years, and viruses that are so well written, even the foremost advanced security companies can’t remove them. So what's 2015 getting to look like?

The truth is we won’t know until it attacks us, this is often sadly the character of the beast, but we will ‘best prepare’ for the longer term.

Perimeter security is not any longer enough; Intrusion Detection Systems (IDS) do an honest job at being abstracted from the appliance but lack context-awareness. what's required for the ever-dangerous cyber world we sleep in maybe a security approach that automatically links context-aware security to abstract security giving the simplest possible hope for the user. These systems represent self-protecting applications, operating systems that are paranoid of their applications then inline dynamic perimeter securities that are just plain schizophrenic. A Hybrid Cloud Quickie

Today I'm looking briefly at the usefulness of a hybrid cloud solution for your business. Hybrid cloud can benefit organizations, primarily by removing the burden of certain operational challenges facing businesses.

Let’s take disaster recovery as our first example. one among the most important advantages cloud environments have in comparison to on-site technology is their resiliency – being cloud-hosted provides unparalleled safety with regard to office-based disasters. With the hybrid extension of the info center model, choices are often made on the situation with regard to levels of resiliency, and also round the replication of your IT enterprise environment to alternate locations. If your office burns down, and your data is stored elsewhere, your business isn’t getting to suffer anywhere near the maximum amount as if you had lost everything.

For example, if a business is regulated by an administration like the FCA for financial institutions, disaster recovery is mandatory. the extent of canopy required differs counting on the actual markets that are operated within.

The office might be located within the guts of any financial district, with its technology centralized during a data center environment. This successively can have replication partners hosting in other data centers, at other geographic locations, even in several countries. This replication is ensuring if a disaster did indeed happen, choices are often made on whether your IT resumption is often established, and if so, how quickly. 

Another exemplar of hybrid cloud is collaboration B2B opportunities. With the emergence of software-defined networking, additional services are often delivered from an equivalent data center, or maybe from other providers that have niche services for your business. during this model anything, ‘aaS’ are often delivered securely from independent software providers and IT Hosting companies, also as other firms which will well enjoy business to business collaboration.

Now let’s check out some samples of this type of hybridization in action. 

Example one would be a business hosting their core infrastructure within a knowledge center and having a requirement for a selected business application that's delivered from just one provider, and not through a SaaS model. Being involved during a hybrid B2B collaboration means they might still be ready to access their application, despite the shortage of SaaS. 

Example two would be a selected sort of recruitment packaged application. A secure networking connection might be employed through the utilization of hybrid cloud connectivity services – simply extending the enterprise to the independent software provider's infrastructure with a simple way of deploying, monitoring, and managing the method.

And finally, example three of the hybrid cloud model’s usefulness is its ability to rework application delivery with disparate data access. Several models that utilize this method exist already today within the emerging application marketplace stores. These cloud marketplaces are almost like the only too familiar smartphone application stores.

Looking at hybrid through another lens, imagine that thanks to restrictive data sovereignty laws it's mandatory that private data has got to reside within your country of residency (fast becoming a reality for a few within the EU). However, the applications, specialist IT infrastructure, and key business services you would like aren't available within your territory. this is able to pose a true business challenge for any organization. Online application marketplaces publishing thousands of applications from overseas locations are helping to avert these issues. Through the use of hybrid networking techniques linking local provisioning of knowledge and storage resources to the specified marketplace applications, acceptable governance is often achieved.

This is similarly true for onboarding applications to a business marketplace from a vendor's standpoint. one independent software vendor based from one location could achieve global status quite literally overnight by being present during a marketplace. 

So, when used appropriately, the Hybrid Cloud model may be a true business enabler, complementing key business services and in line with the pliability that clouds promises


Top Trends and ideas for 2015

Previously we’ve spoken about the highest technology for 2015, so now we’re getting to check out the trends and ideas that are coming into the forefront of our vision. call center technology 2014 saw the increase of massive data as a trend within the tech world, the longer term is basically moving more towards the ways during which we'll analyze and use the info that we've collected.

Trend – Commodity analytics

Advanced, Pervasive, and Invisible Analytics, Gartner calls it; I say Commodity Analytics and that I stand by this. I’m not cheapening the hypercomplex and fine work done by the software and data scientists, if anything they need to do such an honest job of unlocking and demonstrating the worth inside everyone’s data that we all need a piece of it.

Whether I would like to understand where I represent profile views inside my LinkedIn network, or what could be a subsequent big technology trend supported 1,000,000 value sales report from 2014. Analytics, within the broadest sense of the word, is more and more a neighborhood of our lives.

I was reminded to what level recently once I opened my phone and checked the weather for London and was presented with an easy icon representing that it had been getting to be dismal. However, upon brooding about what that symbol represents from an analytics perspective, I soon cheered up. The crunching of 1000s of sensors, past and present weather data for this point of the year, plus satellite and radar inputs all on one among the world's most powerful computers.

I then checked the travel route I used to be planning on taking, once more not great, but this was supported by real-time traffic information from speed sensors along a stretch of 250 miles of the united kingdom giving me a near minute perfect estimation of my journey. I got out of bed with a renewed vigor.

All this demonstrates analytics is becoming truly commoditized. not the preserve of the enterprise boardroom, this technology is now feeding everyone all the time to assist them to make better micro-decisions, also as major ones. Do I take a coat or not? Do I'm going on the M1 or the A1? This all helps make Analytics a much bigger slice of the IT-sphere and whatever we thought we knew about the analytics market in 2014 is going to be child’s play compared with 2015.

Trend – Computing everywhere

The saying wont to be, “That calculator has more power than it took to send men to the moon.” Now the old saying is, “That cheap, relatively low-end smart device has more power than my top of the range laptop 2 years ago.” Computing power is everywhere and therefore the proliferation of high-powered mobile computing has helped to offer application developers far more freedom when developing mobile apps. Dual-core chips became commonplace alongside upwards of 2GB RAM and even 128GB flash disks in phones.

What does this mean for the IT industry? Simple, mobile computing and mobile because the primary business tool is now the truth, if you don’t have a fanatical mobile app to mirror/complement your on-premise or cloud-delivered service, you'll be left behind.

The only thing that’s letting these devices down (more than battery life) is that the mobile networks they now depend on. they're not fast enough; don’t have enough throughput or enough coverage. But I'm not one for just complaining; this is often where the chance lies, building mobile apps that give the sensation of real-time whilst using what little bandwidth they need while counting on the local computing power and storage to cache and process information which is bound for the cloud are often the intermediary step.

Trend – Commoditisation of development

As infrastructure skills become obsolete, the IT department is evolving into a development house. Development isn’t the ‘dark art’ it wont to be, with the united kingdom government stating that coding classes will start at 4 years old from 2015; the sole way is ‘up’ for the number and quality of developers within the UK’s future.

In the here and now, and therefore the next year specifically, we will expect to ascertain development becoming far more commonplace within the SME. an honest question is what is going to they do? As supply chains become more complex and time-to-productivity becomes more and more important, developers can help organizations to realize a competitive edge by developing systems that allow them to: react quicker, deliver sooner, and be better informed than their competition.

How do they achieve this? Well once you are ranging from a blank sheet of paper the planet really is your oyster. the simplest thing is that in most cases an organization gains this competitiveness for fewer than buying the equivalent off-the-shelf product, including the lower costs of maintaining the software.

Don’t get me wrong it isn’t as easy as I even have just made it sound. the event function in an organization requires an ecosystem of individuals. Strong project management is critical, developer operations (DevOps) personnel, but done properly the ROI of this model is often the difference between a corporation being relevant in 2016 or not.

Concept – Hybrid cloud

Cloud computing is worth $121bn. Hybrid cloud’s predicted worth is $1.85tr by 2017, accounting for 50% of all it’s spending consistent with Gartner.

Hybrid cloud, love the name or hate it, is here and it’s getting to be the large cloud enabler of 2015. As CIOs search for the way to make cloud (and I mean “public” cloud) a neighborhood of their architectures, hybrid goes to be that way.

Hybrid cloud will enable cloud bursting for computing and storage, and with Software Defined Infrastructure (SDI) to smooth the network, shared systems and security governance will allow this to be achieved using simply a couple of clicks. However, a couple of things will be got to be overcome, the primary one and therefore the biggest being cost!

One of the contributors to confusion within the cloud has been the perception that it's fundamentally cheaper than on-premise. this will be true, but rarely, because it can often have initially higher costs of implementation. to actually cash in on the cloud you ought to take the time to re-engineer your application's architecture. This sounds scary but isn’t. Secondly the disservice a number of the OS migration tool vendors have done to form enterprises think that they will just lift and shift their operating systems driver, apps, security, and everyone into the cloud.

The very thought sends shivers down my spine! When moving to the cloud the primary thing I tell anyone is. “The cloud isn't a 1 size fit all solution.” the primary thing to try to do is identify what's cloud-ready and what isn’t. this may assist you to start out to understand truth benefits and disadvantages of the cloud.

Understand what the cloud offers your applications (or even single elements of your applications), which of them should be within the cloud, which of them shouldn’t, then architect for this. Once you are doing this, a hybrid cloud becomes your gateway to the simplest service delivery with a highly resilient infrastructure, near unlimited scale (dependent on provider), and spin-up spin-down commercial flexibility.

Concept – Cloud/client architecture

Client/Server you’re so 1990s…

Client/cloud architecture is becoming more and more prevalent within the times of application delivery. check out salesforce.com, Dropbox, office365 to call but a couple of. I'm aware they need servers within the rear, but the purpose is that enterprises are not any longer connecting to a fanatical server, IP address, or, even in most cases, URL. It’s shared on a huge scale and delivers to the mobile device on demand anywhere at any time. Benchmarks of an honest hosting provider

Horse meat burger, cod, and chips, a bacon sandwich, cloud hosting providers… which is that the odd one out? The bacon sandwich, of course.

Last year’s well-publicized food scares aside, the purpose is that always products aren't quite what they appear. So within the list above, why is that the bacon sandwich the odd one out? Well, to date, we've yet to ascertain a successfully counterfeited Bacon sandwich on the market. Often cloud computing hosting providers also are almost what they appear. many promises are made on websites on how good a service is, but on further exploration is that the service actually what it seems? it's useful to explore a number of them.

99.9999% or 100% uptime guarantee

A Service Level Agreement (SLA) may be a measure of availability, which is usually described through percentage statements like 99.999% SLA. When these statements are explored in real-time, this is often the outcome: This information is all excellent, but without watching the fine print it's actually a meaningless and empty promise on the part of the provider. Failure to satisfy an SLA is typically backed by a penalty clause and penalties as an industry-standard aren't normally too onerous for service providers. Traditionally, the provider gives a percentage of the general monthly fee back to the user, counting on the length of the outage. Below may be a table showing what a customer could commonly expect to reclaim: Other important factors to notice when looking into the SLA include:

1. The penalty often doesn't ask for the service as an entire. Your business may have an internet server but the SLA may only be for either network or server availability, therefore the incontrovertible fact that your website isn't working might not be relevant.

2. The advertised SLA doesn't actually match the penalty clause. for instance, your business may are told it'll receive 99.999% availability but the penalty clause starts at 99% availability, so you'd never be fully compensated.

3. it's also important to explore what time the penalty is measured over. it's common that providers use a period of 12 weeks, which actually means on a 99% SLA that your business might be offline for 21.6 hours, or on a 99.9% SLA just over 2 hours and still be within the service level.

4. How is that the availability measured? Monitoring commonly checks servers at various intervals, e.g. every quarter-hour, every 5 minutes, or every minute. supported these tests, short outages may often go unnoticed and it's often impractical to see with a better frequency. 99.999% uptime checked every minute will mean that only longer outages are going to be spotted or that a brief 2-second glitch will show up as a moment long outage.

5. it's usually the customer’s responsibility to request service credit checks and SLA’s are therefore not an honest thanks to determining the standard of service.

Unlimited bandwidth included or 1000 GB bandwidth included

What do these statements actually mean? Well, they might mean any number of things, and statements like these often have an * next to them, referring you to a suitable use policy where they really restrict you to 400GB of throughput. However, more often the most important concern is really how quickly you'll get this bandwidth, how big is that the Internet connection?

To illustrate this further, if we equate Water to Internet traffic and a Hose Pipe to the web connection, the most important pipe will move more water and it really doesn't matter if your contract allows you to maneuver a gallon of water or not. If the Pipe can only move three gallons and you're sharing it with 1,000 people then internet results are going to be a negative experience.

We have ISO 27001 for information security

There are few points which you would like to understand about ISO 27001. Firstly it's an information security management system (ISMS) which suggests that it's a framework for managing security, it's not a type that ensures that an organization is really secure. Only standards like PCI actually provide any guarantees, as they're prescriptive about processes, not just suggestive.

Due to the very fact that it's a system, people can just buy an off the shelf set of processes and procedures and quickly demonstrate an ISMS without actually really properly implementing it. However, there are some new legislation guidelines being released soon, which can mean that the auditor is going to be paying much more attention to the ‘monitor and measurement’ section which can hopefully improve things.

When you set up an ISMS the business also sets the scope of the system and a few Cloud providers are known to use this to their advantage. for instance, the business could limit the system scope to the ‘spare parts’ management element of the business then publicly broadcast that it's IS0 27001 compliant but conveniently not mention rebuke. There are positive and negative elements to IS0 27001 and although it's an honest indicator of the strengths of a hosting provider, you clearly got to ask quite “do you've got an IS0 27001 accreditation?”

See terms and Conditions

Remember, what a business offers on the web site isn't necessarily what you get. as an example, I recently witnessed a corporation offering a Hosted Email solution and on its homepage, the provider boldly stated that they offered a free backup service. I couldn't find this mentioned anywhere else on the website and after further inspection, I discovered that their terms and conditions actually stated that backup wasn't included within the service unless expressly mentioned in your selected email package. I will be able to allow you to draw your own conclusions on this.

Your business must check the terms and conditions closely so as to explore the complete nature of the service being provided, particularly on longer contracts. you'll check-in for a service that allegedly offers UK hosting on dedicated hardware, fully IS0 27001 audited facilities, but if the supplier then decides that they wished to migrate over to Amazon Web service, you'll not be ready to legally stop him. Equally, you'll be contractually obliged to still use the service no matter any changes. Contracts should give your business the proper to cancel if there's any fundamental change to the character of the service delivery.

You are nearly always ultimately responsible for your own data and most contracts will state that the service provider shall not be liable for loss or corruption of knowledge or information. this is often not necessarily because they're a poor provider but actually because it's hard, if not impossible, to urge insurance against that sort of loss – especially when it's so difficult to put a worth on data.

I hope that by reading this blog you've got realized that it's easy for providers to cover behind the web world during which we sleep, so closely check what you're buying. simply because the web site looks good and you recognize the brand, it doesn't guarantee that you simply receive the extent of service which you're expecting. it's also important to recollect that a lot of the technologies utilized in the Cloud are new and long-standing, strong brands also will be new to these technologies, and their previous ethos might not necessarily add to the new Cloud world. Many companies historically may be excellent at providing break-fix style contracts, but can they stop things breaking within the first place?

Originally published on Compare the Cloud 16 April 2013 as What makes a top-quality Cloud hosting provider? by Richard May.

Concept – SDE Software Defined Everything

Software-defined data centers appeared to come aged last year, by this I mean, within the world of the SME. It’s the standard story of a product pioneered thanks to a specialist need, during this case the necessity of Internet-scale companies, namely NASA and Rackspace. Open-sourced, then rapidly developed too far beyond the specified capabilities, then adopted by the MSP world at large.

Over a previous couple of years, all the massive vendors have developed a play of some description. The project as an entire has matured dramatically. cloud computing technology Services companies like Mirantis have sprung up to supply professional services around the technology. All of this helps to de-risk and make adoption easy and straight-forward for the top customers that are getting to turn it from the top of the CIO agenda to defacto within the SME datacenter.

Concept – Risk-based security and self-protection

To maintain a secure open and secure cyberspace we must look to new methods which will keep us before the threats in 2015. we've already seen cyber weapons developed which derailed Iran’s nuclear program by 2 years, and viruses that are so well written, even the foremost advanced security companies can’t remove them. So what's 2015 getting to look like?

The truth is we won’t know until it attacks us, this is often sadly the character of the beast, but we will ‘best prepare’ for the longer term.

Perimeter security is not any longer enough; Intrusion Detection Systems (IDS) do an honest job at being abstracted from the appliance but lack context-awareness. what's required for the ever-dangerous cyber world we sleep in may be a security approach that automatically links context-aware security to abstract security giving the simplest possible hope for the user. These systems represent self-protecting applications, operating systems that are paranoid of their applications then inline dynamic perimeter securities that are just plain schizophrenic.

We need all of this while improving the user experience, and giving more access and adaptability to extend productivity. No small task…

The truth is, this is often my guess, but who is to mention that tomorrow some unknown technology won’t come along and disrupt everything, which is strictly what I really like about our industry.

We need all of this while improving the user experience, and giving more access and adaptability to extend productivity. No small task…

The truth is, this is often my guess, but who is to mention that tomorrow some unknown technology won’t come along and disrupt everything, which is strictly what I really like about our industry.