Linux Containers Authors: Carmen Gonzalez, Jim Kaskade, Yeshim Deniz, Liz McMillan, Elizabeth White

Related Topics: @CloudExpo, Java IoT, Linux Containers, Containers Expo Blog, @BigDataExpo, SDN Journal

@CloudExpo: Article

Top Ten Considerations for a Converged Infrastructure Investment

Ten tips you should consider to maximize the benefits of a Converged Infrastructure investment

Archie Hendryx looks at the benefits and challenges of managing multiple IT components through a single support solution

Many public sector organisations are not changing their ICT legacy systems. As a result, they face increasing number of inefficiencies and challenges. These issues can nevertheless be overcome, and performance increased, by managing these legacy systems within a converged infrastructural environment. This approach can also reduce the risks associated with legacy systems, such as security, missing functionality, increased complexity and operational expenditure.

Converged infrastructure simplifies support as it packages multiple IT components from different vendors into one single, optimised computing solution. So it offers end-to-end support unlike reference architectures, which require organisations to deal with a multitude of disparate vendors to gain support. Converged infrastructure removes the need to manage multiple upgrade cycles, offers pre-tested interoperability and release management resources. It enables organisations to centralize the management of IT resources.

A converged infrastructure has pre-configured and pre-tested configurations while reference architectures follow certain guidelines. Converged infrastructures tend to have defined scalability. Reference architectures are completely flexible but they have no defined performance boundaries, making it less predictable than a converged infrastructure.

The components of a converged infrastructure include servers, data storage devices, networking equipment, software for IT infrastructure management, automation and orchestration. A converged infrastructure can be used as a platform for private, hybrid and public cloud computing services: e.g. infrastructure-as-a-service (IaaS), platform-as-a-service (PaaS) and software-as-a-service (SaaS).

The journey towards operating converged infrastructure should begin by establishing a business case: both technical and commercial goals and objectives such as the ability to deploy new products and services to market much faster than a traditional IT model all so often permits. Reliability, data security and a reduction in infrastructural complexity will no doubt be at the core of your proposition. There may be a number of other factors in play, and many of these could point you towards developing a converged cloud infrastructure because it delivers efficiency, reduces complexity without reducing security.

Tips to improve performance

1. Restructure your complex and disparate IT technology-focused silos to a centralised, streamlined and service-oriented converged infrastructure team that will be able to do a lot more a lot quicker. Traditional designs are based on in house and siloed expertise that inevitably introduce risk as success depends on this expertise being shared and correlated between teams prior to building the infrastructure.

Speed to deployment and agility is a key factor with converged infrastructure where new project rollouts can be reduced from months to days. To enhance this, a model that includes a capacity on demand buffer model should be looked at. This enables the public sector to have additional inventory installed in their converged infrastructure for unplanned growth and projects, where the payment of such inventory is only made once it's consumed. This consequently reduces project delivery times drastically.

Another key factor is the support model, which should provide a single and seamless model. Instead of a dial in number that ultimately sends you to various departments for all the infrastructure components, the support model should be set up to manage and maintain the single product, namely the converged infrastructure. This will consequently reduce the mean time to resolution for the public sector considerably if and when any issues arise.

2. Prepare for simplified operations. Converged infrastructure offers the opportunity to simplify and centrally monitor your workloads and capacity management as well as application performance.

3. Look to fully virtualise your environment. Converged infrastructures can enable you to immediately consolidate and virtualise your workloads. This provides the flexibility to seamlessly move resources from one virtual machine to another and also avoid vendor lock in should you decide to move to another platform at a later date. Legacy systems can often cause headaches, but with a converged cloud infrastructure an opportunity arises to gain a highly virtualised, optimised, secure and a highly available but also stable platform that will improve performance while enhancing existing services.

4. Plan for data protection. Accidental data loss is perceived as the biggest security threat to public sector organisations so a backup and recovery solution that comes pretested and pre-integrated with your converged infrastructure should be a serious consideration.

5. Prepare to streamline your security policies. Converged Infrastructures offer the ability to enhance security controls and increase compliance while still offering the benefits associated with cloud. For example instead of complex and costly deployments of physical security infrastructure, virtualised appliances and enterprise software security suites offer the same features but with the added agility of being virtualised.

6. Implement a disaster recovery solution. Converged infrastructures offer the ability to quickly standardise the platform specifications between two sites as well as shift away from complex, convoluted and manual failover methods. With pretested and pre-integrated disaster recovery and avoidance solutions, failover and failback processes can be automated tasks that mitigate risk and reduce OPEX costs being introduced when protecting against a disaster.

7. Initiate a private cloud strategy. A converged infrastructure removes a lot of the infrastructure challenges associated with deploying a private cloud and offers a standardised and optimised platform that can allow you to focus on designing service catalogues, blueprints, chargeback, billing, approval processes etc. By implementing an integrated self-service provisioning model, the converged infrastructure enables a Private Cloud to be quickly deployed allowing workloads and resources to be provisioned and allocated in minutes.

8. Include a strategy to accommodate a software defined data centre (SDDC) approach. Converged infrastructure offerings are already incorporating solutions that enable a SDDC that consequently help free up even more administration time and resources. SDDC extends the benefits of virtualisation by incorporating orchestration, automation and management to core components enabling IT admin to become proactive and subsequently innovative.

Additionally the load sharing and balancing of resources within converged infrastructures and SDDC models allows for higher efficiency and utilisation as well as streamlined infrastructure scalability enabling the business to meet future and unplanned demands in a seamless manner.

The higher availability and testable disaster recovery solutions also allow the business to safeguard against the unnecessary costs and fines associated with unplanned downtime. Ultimately the streamlining of manual and complex processes into functions that are automated and orchestrated allows the business to focus on new initiatives and application delivery and consequently forget about the infrastructure that supports them.

9. Establish new internal architectural and compliance standards that cater for converged infrastructure. Instead of having to design, document and adhere to standards for every single component within a traditional infrastructure, converged infrastructures are a comprehensive product. This simplifies internal processes considerably as the standardisation, design, integration, security, availability, support and maintenance of converged infrastructures are already catered for by the vendor.

A converged infrastructure should incorporate a release certification matrix that validates all of the patches, maintenance and upgrades of all of the product's components throughout its lifecycle. To ensure this compliance an API that can scan, validate, present and monitor the infrastructure as a whole is a necessity. Unless a converged infrastructure includes this it ultimately remains a well-marketed collection of components that will offer little if any advantage over a traditional infrastructure.

Furthermore the converged infrastructure offering should include quality assurance that fully tests and validates all software updates for security and availability vulnerabilities consequently reducing ongoing risks. This will allow public sector organisations to extend their capabilities by integrating additional security and compliance controls to meet their objectives. The key here is that security and high availability is built in at the outset rather than added as an afterthought, ensuring the confidentiality, integrity and availability of the business infrastructure.

10. Simplify process management. Change management, incident management, asset management etc. are all processes that can be significantly simplified with a converged infrastructure offering and in most cases automated. For example asset management becomes simplified in that the configuration management database input now replaces thousands of complex components with a single entity that has all of its components supported by a single vendor as a single product. Additionally monitoring, alerting, logging, maintenance, patching and upgrading procedures can all be automated with converged infrastructure, mitigating the risk associated with manual tasks.

With traditional deployments you need to keep patches and firmware up to date with multiple vendors, components and devices which requires internal IT to assess the criticality of each patch and relevance to each platform as well as validate firmware compatibility with other components. This requires costly mirrored Production Test Labs and then also having rollback mechanisms if there are any issues.

Coupled with these risks, the multiple vendors needed to support a traditional infrastructure lead to prolonged resolution times when issues occur. Logging a support call for a traditional infrastructure first needs the identification of who is responsible: this might be the storage vendor, the networking company, the hypervisor or the server manufacturer.

Archie Hendryx is Principal vArchitect at converged infrastructure supplier VCE

Original article taken from Public Technology Magazine.

More Stories By Archie Hendryx

SAN, NAS, Back Up / Recovery & Virtualisation Specialist.

@ThingsExpo Stories
SYS-CON Events announced today that MathFreeOn will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. MathFreeOn is Software as a Service (SaaS) used in Engineering and Math education. Write scripts and solve math problems online. MathFreeOn provides online courses for beginners or amateurs who have difficulties in writing scripts. In accordance with various mathematical topics, there are more tha...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today that Transparent Cloud Computing (T-Cloud) Consortium will exhibit at the 19th International Cloud Expo®, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The Transparent Cloud Computing Consortium (T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data proces...
Donna Yasay, President of HomeGrid Forum, today discussed with a panel of technology peers how certification programs are at the forefront of interoperability, and the answer for vendors looking to keep up with today's growing industry for smart home innovation. "To ensure multi-vendor interoperability, accredited industry certification programs should be used for every product to provide credibility and quality assurance for retail and carrier based customers looking to add ever increasing num...
@ThingsExpo has been named the Top 5 Most Influential M2M Brand by Onalytica in the ‘Machine to Machine: Top 100 Influencers and Brands.' Onalytica analyzed the online debate on M2M by looking at over 85,000 tweets to provide the most influential individuals and brands that drive the discussion. According to Onalytica the "analysis showed a very engaged community with a lot of interactive tweets. The M2M discussion seems to be more fragmented and driven by some of the major brands present in the...
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to impr...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
Amazon has gradually rolled out parts of its IoT offerings, but these are just the tip of the iceberg. In addition to optimizing their backend AWS offerings, Amazon is laying the ground work to be a major force in IoT - especially in the connected home and office. In his session at @ThingsExpo, Chris Kocher, founder and managing director of Grey Heron, explained how Amazon is extending its reach to become a major force in IoT by building on its dominant cloud IoT platform, its Dash Button strat...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessi...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
Major trends and emerging technologies – from virtual reality and IoT, to Big Data and algorithms – are helping organizations innovate in the digital era. However, to create real business value, IT must think beyond the ‘what’ of digital transformation to the ‘how’ to harness emerging trends, innovation and disruption. Architecture is the key that underpins and ties all these efforts together. In the digital age, it’s important to invest in architecture, extend the enterprise footprint to the cl...
Almost everyone sees the potential of Internet of Things but how can businesses truly unlock that potential. The key will be in the ability to discover business insight in the midst of an ocean of Big Data generated from billions of embedded devices via Systems of Discover. Businesses will also need to ensure that they can sustain that insight by leveraging the cloud for global reach, scale and elasticity.