Search Results for: cost of downtime

Security is Imperative for BYOD, Mobile Deployments

Nearly two-thirds of businesses – 62% — now allow their end users to “bring their own devices (BYOD)” and use them as their corporate desktops or mobile devices to access organizational data including Email, applications and sensitive data. However, 71% of businesses that allow BYOD, have no specific policies and procedures in place to support BYOD deployment and ensure security.

That’s according to the latest independent joint survey conducted by ITIC and KnowBe4.com, a Clearwater, Florida company that specializes in security awareness training. The ITIC/KnowBe4.com survey, polled 550 companies worldwide in July and August. The survey survey found that only 13% of respondents said their firms have specific policies in place to deal with BYOD deployments, while another nine percent indicated they were in the process of developing BYOD procedures.

“These survey findings should act as a wake-up call to galvanize corporations into proactively managing and securing corporate data accessed by mobile BYOD devices before they suffer an expensive and potentially crippling loss or hack,” said ITIC principal analyst Laura DiDio. She continued, “Every firm regardless of size should conduct a risk assessment review and adopt strong security and management policies to deal with increasingly mobile BYOD deployments.” …

Security is Imperative for BYOD, Mobile Deployments Read More »

IBM Powers Up New PowerLinux Products, Strategy

IBM this week unveiled its latest generation of industry standard Linux-only servers optimized for its Power architecture along with a new strategy targeting specific x86 applications and workloads.

IBM has been a longtime Linux proponent, supporting industry standard distributions like Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise – on its Power Systems line for the last 12 years. This week’s announcement reaffirms Big Blue’s commitment to Linux and broadens its scope with offerings designed to drive more growth for the Power platform in the lucrative x86 arena. IBM will fuel this growth via its mantra, “Tuned to the task,” which emphasizes delivering higher quality and superior economics than rivals.

According to Scott Handy, vice president of IBM’s PowerLinux Strategy and Business Development, “This is an extension to our overall Power strategy to address the Linux x86 space and drive more growth for our Power Systems servers.” …

IBM Powers Up New PowerLinux Products, Strategy Read More »

IBM STG Group Posts Positive Gains, Offers Strong Strategy & Growth Roadmap

Vendor sponsored Analyst conferences are oftentimes long on self-congratulatory hyperbole and short on substance. That wasn’t the case with IBM’s Systems and Technology Group Analyst conference held last week in Rye Brook, NY.

The STG conference, led by Rod Adkins, Senior Vice President of the STG Group, showcased the division’s solid accomplishments over the last several years and detailed the current and future product roadmap and investment strategy. Investments focused around three major areas: Systems, growth markets and strategic acquisitions. Adkins could have easily added a fourth category: patents. The U.S. Patent Office granted IBM’s STG division 2,680 patents in 2010 and it could exceed that number in 2011. One only has to scan the headlines and peruse the ongoing patent purchasing frenzy and the plethora of lawsuits involving all of the major vendors to realize the pivotal role patents play as both and offensive and defensive weapon. IBM, in its Centenary year, holds more patents than any other U.S. technology vendor.

STG 2011 Milestones

Noting that STG is aligned with IBM’s overall growth strategy, Adkins detailed the division’s milestones throughout the first three quarters in 2011. They included: …

IBM STG Group Posts Positive Gains, Offers Strong Strategy & Growth Roadmap Read More »

IBM, Stratus, Microsoft Score High Marks in ITIC Fall 2011 Global Reliability Survey

For the third year in a row, IBM AIX v7.1 UNIX operating system (OS) running on the company’s Power System servers scored the highest reliability ratings and recorded the least amount of overall downtime from Tier 1, Tier 2 and Tier 3 outages among 18 different server OS platforms.

Over three-quarters or 78% of survey respondents indicated they experienced less than one of the most prevalent, minor Tier 1 incidents per server, per annum on IBM’s AIX v. 5.3 and AIX v 7.1 distributions. An 83% majority of IBM AIX v 7.1 and Novell SUSE Enterprise Linux Server 11 and 82% of Windows Server 2008 R2 survey respondents indicated their organizations experienced less than one unplanned, severe/lengthy Tier 3 outage per server, per annum (See Exhibit 1).

Microsoft’s Windows Server 2008 R2 (which scored the biggest year-over-year reliability gains), and Novell’s SUSE Enterprise Linux Server 11 closely challenged IBM’s AIX v 7.1 server OS reliability and uptime – particularly with respect to the most severe and costly Tier 3 outages. Unplanned Tier 3 outages – whether manmade or as the result of a disaster — typically cause downtime in excess of four hours. There is widespread disruption of applications and network operations; customers and business partners are frequently impacted and Tier 3 incidents will almost always require remediation by a significant portion of the IT staff. …

IBM, Stratus, Microsoft Score High Marks in ITIC Fall 2011 Global Reliability Survey Read More »

ITIC 2011 Reliability Survey: Users Give IBM AIX v7, Windows Server 2008 R2 Highest Security Marks

IBM AIX v7 and Windows Server 2008 R2 Highest Security Marks

Nine out of 10 — 90% — of the 470 respondents to ITIC’s 2010-2011 Global Server Hardware and Server OS Reliability survey rated the security of Microsoft’s Windows Server 2008 R2 and IBM’s AIX v7 as “Excellent” or “Very Good.” This was the highest security ratings out of 18 different Server Operating System distributions (See Exhibit below). Three-quarters or 75% of survey participants gave HP UX 11i v3 “Excellent” or “Very Good” security ratings; this was the third highest ranking of the 18 major server OS distributions polled. This was followed by Ubuntu Server 10 and Debian GNU/Linux 5, which tied for fourth. Seven out of 10 survey participants — 71% — of those polled ranked the two most popular open source distributions’ security as “Excellent” or “Very Good.” Red Hat Enterprise Linux v 5.5 and Novell SuSE Linux Enterprise 11, the two most widely deployed Linux distributions trailed Debian and Ubuntu but were nearly tied with each other in security rankings. Just over two-thirds — 67% — of Red Hat users rated its security as “Excellent or Very Good” while 66% of survey participants judging Novell SuSE Linux Enterprise 11 security to be “Excellent” or “Very Good.”

Some 58% of Apple Mac OS X 10.6 survey respondents rated its security as “Excellent” or “Very Good,” putting it at the bottom of the pack, beating only Oracle’s Solaris 10 which was rated “Excellent” or “Very Good” by 63% of respondents, which in the past two years has been notching modest gains among corporate users.

Also noteworthy was the fact that only a very small percentage of respondents gave thumbs down “Poor” or “Unsatisfactory” security grades to their server operating system vendors. In this category, Apple had the highest percentage of respondents – 7% — who gave its Mac OS X 10.6 both “Poor” and “Unsatisfactory” marks. This might appear puzzling to some since Apple’s users have long touted the security of the platform. Apple users have long boasted about the fact that there are far fewer viruses and malicious code written targeting Macs compared to Windows. However, now that Apple is once again re-emerging as a significant presence in corporate networks, the Mac OS X 10.6 will no longer enjoy the “security by obscurity” that it claimed as a standalone consumer OS. Macs, iPhones, iPads and tablets are becoming mainstream staples as business tools. Hence, the number of exploits, including such malware as worms, Trojans and bots that target the Mac is increasing commensurately. Apple will have to respond accordingly with tighter security. …

ITIC 2011 Reliability Survey: Users Give IBM AIX v7, Windows Server 2008 R2 Highest Security Marks Read More »

ITIC 2011 Reliability Shows that Dell, HP, IBM & Stratus Score High Marks for Service & Support

Dell, HP, IBM and Stratus Technologies won high praise from corporate users for their prompt and efficient after market technical service and support in the latest ITIC 2010-2011 Global Server Hardware and Server OS Reliability survey.

The results came from a broad based survey that polled organizations worldwide on the reliability, security and technical service and support from among 14 of the leading server hardware platforms and 18 of the most widely deployed server operating system distributions.

As we said in an earlier discussion, each poll elicits some surprising and unexpected revelations. In this survey, users reserved their highest encomiums and most critical barbs for the server hardware vendors – both in terms of product performance and reliability and the service and support they receive from their respective vendors. …

ITIC 2011 Reliability Shows that Dell, HP, IBM & Stratus Score High Marks for Service & Support Read More »

IBM, Stratus, HP, Fujitsu Top ITIC/GFI Software Hardware Reliability Survey

For the third year in a row, IBM AIX Unix operating system (OS) running on the company’s Power System servers scored the highest reliability ratings among 19 different server OS platforms – including other Unix variants, Microsoft’s Windows Server, Linux distributions and Apple’s Mac OS X.

Over three-quarters or 78 percent of survey respondents indicated they experienced less than one of the most common, minor Tier 1 incidents per server, per annum on IBM’s AIX v. 5.3 and AIX v 7.1 distributions
Those are the results of the ITIC 2010-2011 Global Server Hardware and OS Reliability Survey. ITIC partnered with GFI Software (formerly Sunbelt Software) to conduct this independent Web-based survey. It polled C-level executives and IT managers at 468 corporations from 23 countries worldwide from November through January.

The survey data indicated that the reliability and uptime of all the major server OS and server hardware distributions has improved significantly over the past several years. …

IBM, Stratus, HP, Fujitsu Top ITIC/GFI Software Hardware Reliability Survey Read More »

Cloud Computing: Pros and Cons

Cloud computing like any emerging new technology has both advantages and disadvantages. Before beginning any infrastructure upgrade or migration, organizations are well advised to first perform a thorough inventory and review of their existing legacy infrastructure and make the necessary upgrades, revisions and modifications. Next, the organization should determine its business goals for the next three-to-five years to determine when, if and what type of cloud infrastructure to adopt. It should also construct an operational and capital expenditure budget and a timeframe that includes research, planning, testing, evaluation and final rollout.
Public Clouds: Advantages and disadvantages
The biggest allure of a public cloud infrastructure over traditional premises-based network infrastructures is the ability to offload the tedious and time consuming management chores to a third party. This in turn can help businesses:
• Shave precious capital expenditure monies because they avoid the expensive investment in new equipment including hardware, software, and applications as well as the attendant configuration planning and provisioning that accompanies any new technology rollout.
• Accelerated deployment timetable. Having an experienced third party cloud services provider do all the work also accelerates the deployment timetable and most likely means less time spent on trial and error.
• Construct a flexible, scalable cloud infrastructure that is tailored to their business needs. A company that has performed its due diligence and is working with an experienced cloud provider can architect a cloud infrastructure that will scale up or down according to the organization’s business and technical needs and budget.
The potential downside of a public cloud is that the business is essentially renting common space with other customers. As such, depending on the resources of the particular cloud model, there exists the potential for performance, latency and security issues as well as acceptable response and service and support from the cloud provider.
Risk is another potential pitfall associated with outsourcing any of your firm’s resources and services to a third party. To mitigate risk and lower it to an acceptable level, it’s essential that organizations choose a reputable, experienced third party cloud services provider very carefully. Ask for customer references; check their financial viability. Don’t sign up with a service provider whose finances are tenuous and who might not be in business two or three years from now.
The cloud services provider must work closely and transparently with the corporation to build a cloud infrastructure that best suits the business’ budget, technology and business goals.
To ensure that the expectations of both parties are met, organizations should create a checklist of the items and issues that are of crucial importance to their business and incorporate them into Service Level Agreements (SLAs) Be as specific as possible. These should include but are not limited to:

• What types of equipment do they use?
• How old is the server hardware? Is the configuration powerful enough?
• How often is the data center equipment/infrastructure upgraded?
• How much bandwidth does the provider have?
• Does the service provider use open standards or is it a proprietary datacenter?
• How many customers will you be sharing data; resources with?
• Where is the cloud services provider’s datacenter physically located?
• What specific guarantees if any, will it provide for securing sensitive data?
• What level of guaranteed response time will it provide for service and support?
• What is the minimum acceptable latency/response time for its cloud services?
• Will it provide multiple access points to and from the cloud infrastructure?
• What specific provisions will apply to Service Level Agreements (SLAs)?
• How will financial remuneration for SLA violations be determined?
• What are the capacity ceilings for the service infrastructure?
• What provisions will there be for service failures and disruptions?
• How are upgrade and maintenance provisions defined?
• What are the costs over the term of the contract agreement?
• How much will the costs rise over the term of the contract?
• Does the cloud service provider use the Secure Sockets Layer (SSL) to transmit data?
• Does the cloud services provider encrypt the resting data to prohibit and restrict access?
• How often does the cloud services provider perform audits?
• What mechanisms will it use to quickly shut down a hack and can it track a hacker?
• If your cloud services provider is located outside your country of origin, what are the privacy and security rules of that country and what impact will that have on your firm’s privacy and security issues?
Finally, the corporation should appoint a liaison and that person should meet regularly with a representative from the cloud services provider to ensure that the company attains its immediate goals and that it is always aware and working on future technology and business goals. Outsourcing all or any part of your infrastructure to a public cloud does not mean forgetting and abandoning it.
Private Clouds: Advantages and Disadvantages
The biggest advantage of a private cloud infrastructure is that your organization keeps control of its corporate assets and can safeguard and preserve its privacy and security. Your organization is in command of its own destiny. That can be a double-edged sword.
Before committing to build a private cloud model the organization must do a thorough assessment of its current infrastructure, its budget and the expertise and preparedness of its IT department. Is your firm ready to assume the responsibility for such a large burden from both a technical and ongoing operational standpoint? Only you can answer that. Remember that the private cloud should be highly reliable and highly available – at least 99.999% uptime with built-in redundancy and failover capabilities. Many organizations currently struggle to maintain 99.9% uptime and reliability which is the equivalent of 8.76 hours of per server, per annum downtime. When your private cloud is down for any length of time, your end users (and anyone else who has access to the cloud) will be unable to access resources.
Realistically, in order for an organization to successfully implement and maintain a private cloud, it needs the following:
• Robust equipment that can handle the workloads efficiently during peak usage times
• An experienced, trained IT staff that is familiar with all aspects of virtualization, virtualization management, grid, utility and chargeback computing models
• An adequate capital expenditure and operational expenditure budget
• The right set of private cloud product offerings and service agreements
• Appropriate third party virtualization and management tools to support the private cloud
• Specific SLA agreements with vendors, suppliers and business partners
• Operational level agreements (OLAs) to ensure that each person within the organization is responsible for specific routine tasks and in the event of an outage
• A disaster recovery and backup strategy
• Strong security products and policies
• Efficient chargeback utilities, policies and procedures
Other potential private cloud pitfalls include: deciding which applications to virtualize; vendor lock-in and integration and interoperability issues. Businesses grapple with these same issues today in their existing environments. At present, however, the product choices from vendors and third party providers are more limited for virtualized private cloud offerings. Additionally, since the technology is still relatively new, it will be difficult from both a financial as well as technical standpoint to switch horses in midstream from one cloud provider to another if you encounter difficulties.
There is no doubt that virtualized public and private cloud infrastructures adoptions will grow significantly in the next 12 to 18 months. In order to capitalize on their benefits, lower your total cost of ownership (TCO), accelerate return on investment (ROI) and mitigate risk your organization should take its time and do it right.

Cloud Computing: Pros and Cons Read More »

Scroll to Top