Thursday, October 27, 2005

Resource Reuse

View in your Web browser.
OPTIMIZING INFRASTRUCTURE

Sponsor: Aruba Networks
Discover a new architecture for mobility in this informative white paper. Deployed as an overlay to existing networks, the "mobile edge" approach delivers mobility that users demand, security needed by the business and a converged multimedia network that realizes cost savings for the bottom line. Read the free white paper today!

Hot White Papers
View entire Research Library

 

Oct. 27, 2005
Whether maximizing secondary sites or taking advantage of virtualization, companies are finding new ways to reuse resources and save money.
Also in this Issue
Leveraging Networks for Offsite Storage
Is NetWare Dead?
Solution Providers Prepare for Wilma
 
Top Insights

Computerworld: A fact of life: Servers often sit idle. Virtualization pools these resources, offering the ability to meet growing storage demands without purchasing additional hardware. New Jersey-based Hunterdon Medical Center, which adopted the technology to reduce its number of servers and take advantage of existing infrastructure, is profiled here. The options can be mind-boggling: virtualization on the storage-array controller, on a server, or on an intelligent switch. A table near the end of the article gives the benefits and trade-offs for each type of virtualization.
SPONSOR
 
ADDITIONAL READING:
Data Storage Today: A recent Gartner Group study found the average network downtime cost for businesses in all industries is more than $1 million per hour. With that said, costly and time-consuming data backup procedures that can interfere with business continuity are now more of a burden than ever. A recent trend involves utilizing an organization's IP infrastructure to perform remote backups, making the network a key part of data backup and recovery. But only one-third of distributed enterprises and one-fifth of SMBs are backing up data at remote offices. Efficiencies in bandwidth and storage space make remote data backup solutions highly justifiable. The article ends with a list of key features to look for when selecting a solution and questions to answer about the business requirements to be supported by the backup technology.
 
ADDITIONAL READING:
Sponsor: ROS Incorporated

Learn Secrets of Superior Outsourcing Programs
Some companies make the same outsourcing mistakes over and over, while others develop a successful outsourcing process. Learn how knowledge management and metrics are critical to superior outsourcing methodologies.

> Click here to download free white paper.

TechWeb: One of the problems with Linux is incompatibility among the various distributions. Consequently, independent software vendors must create separate versions of their software for each Linux distribution. The goal of the Free Standards Group is to develop and promote open Linux standards. Such standards are vital in the battle with Windows, where such problems do not exist — unless you factor in the various versions of Windows. The FSG's Linux Standard Base workgroup is overseeing work that will not only promote cross-distribution development but significantly increase total development for Linux applications, thus increasing Linux's market share, the body predicts.
 
ADDITIONAL READING:
CRM Buyer: Operating a dedicated secondary site for disaster recovery is often a costly requirement for most organizations. One approach to recouping some of these costs is putting those resources to work when they are idle. They may help with testing and development, quality assurance and data processing, as well as many other resource-intensive chores. This scenario does require production data to be available at the secondary site.

Special Offer: Free White Paper

A Strategic Imperative for Averting Risk & Improving Performance
White paper explalins how business continuity and high availability contributes to comprehensive risk mitigation and business enhancement. In addition, it outlines the HP portfolio of solutions available to help businesses maximize the value of business continuity and availability - to transform challenges into opportunities for success. Read it today!

Intelligent Enterprise: Within the major issue of system integration, often overlooked is integrating the data contained in disparate systems to make it readily available to the user community; Forrester Research says the typical enterprise has at least three content repositories needing integration. The common strategy involves a centralized repository or portal into the aggregated data from these systems. Content management products like IBM's WebSphere Information Integrator, Documentum's ECI Services and Oracle's Collaboration Suite can bring the data together. This article goes into detail on the components of the content integration stack: connectivity services, metadata services, federated search, virtual repository and advanced services.

Techworld: NetWare's days of dominating the network operating system (NOS) market are clearly over. The proliferation of the Internet and subsequent rise of the IP network are just two factors in NetWare's decline, which is described in detail here. In the meantime, Novell has transformed itself from a NOS vendor to a Linux advocate with a flagship offering in SuSE. As Novell pushes its latest initiative, OpenSuSE, it staunchly rejects the idea of NetWare's death. The company will continue to support it even as the customer base decreases by half to less than 1.5 million servers by 2008.

Enterprise Storage Forum: UK-based Bloor Research reports iSCSI usage is steadily growing — finally. iSCSI is an IP-based standard for linking data storage devices over a network and transferring data by carrying SCSI commands over IP networks. iSCSI offerings from vendors like EqualLogic are firmly entrenched in the enterprise, according to an analyst at Data Mobility Group. Its main rival is Fibre Channel. Cisco is banking on Fibre Channel with the view that iSCSI is better suited for mid-range applications.

IT Marketplace
Hardware
Data Privacy/Data Encryption Solutions
Dominion Series - Digital KVM Console Access and Connectivity Solutions
Software
WebFOCUS Query and Analysis Solutions (OLAP and Ad Hoc Reporting Tools)
TransactionVision - Business Process Monitoring
Events
The Business Case for Business Rules
Publications
Implement Your Outsourcing Initiatives with These Process Templates
All the Basics of IT Management
 
White Papers
Your E-Mail System: Liability or Asset?
Choosing the Right Disk-based Backup Solution
VoIP: Creating a Strategy That Enables Future Voice Applications
Training & Tools
Best Practices Guide Walks You Through IT Strategic Planning
IT Operations Guide Perfect for IT and non-IT Managers
Be Ready for a Disaster with this Best Practices Guide
IT Services (listings available)
Jobs (listings available)
Tell the IT Business Edge audience of technology decision makers about your product, service, event, or job. Click here to list it in the IT Marketplace!

3 QUESTIONS:
Stack Support Gets Sophisticated

With Joaquin Ruiz, vice president of product marketing for SpikeSource, which offers tested and certified open source software stacks for the enterprise.

Editor's note: This interview originally appeared in Leveraging Open Source.

Question: What are the concerns and questions of new clients to SpikeSource? What are they looking for?
Ruiz: Generally, the concerns fall around the ability to support and to meet SLAs for the offerings that we have using open source. Especially with some of the larger companies, who have been early adopters, specifically in financial services, what open source allows them to do is not just to mitigate or reduce their license costs but it allows them to rapidly deploy a solution that directly affects their end customers. So that shrinks time to market. Then they find out they have to build their own internal support mechanism in order to maintain the infrastructure. From there, you have to have either expertise directly in the components that you've deployed, not just from a developer perspective but from a support perspective, and then you need to interact with many different constituents, like the people who actually own the source code. All this is aggravated by the fact that the open source that they've put into play isn't just one unit; it's many. All these components are on an asynchronous release rate. So if you've got a patch that affects security in Apache, that may influence or directly impact the database, the indexing engine, the application, the operating system; the repercussions of that can go up and down the stack. So it's not just about being able to source a patch for that component, it's about being able to test that across the board.

Question: Is the demand stronger for the defined, pre-built configurations, or is it spread between those and the option of the customized, made-to-order stack?
Ruiz: I think this goes to the credit of the engineers who have originally put the stacks together, but the demand is slightly skewed toward the pre-built. The largest customers want slight or major tweaks, but if you just look at raw numbers, that'll go to the pre-built. The pre-built stuff is basically getting the developers to a high enough watermark where they can start adding value. Here's a LAMP stack or a LAMPJ stack, here's a Web services stack; from there, they can start adding value. So they're very common building blocks.

Question: How is the configuration manager affected by the choice of pre-built or made-to-order configurations?
Ruiz: From a technical perspective, we've broken up the configuration manager into a couple of toolsets. ... Whether it's a pre-built or custom stack, there are only so many permutations of the custom stack. We have in fact built a stack integration module (SIM). Any permutation of the stack that you could do for the made-to-order stack is already taken into account. So we have a configuration file for any permutation. The reason we've done that is because we needed to test all those permutations in order to ensure we're delivering a valid configuration to the customer. That's part of the beauty and strength of SpikeSource; the technology here is extremely strong, not just from the point of view of a nice, well-integrated stack, but because we have this large, automated test harness. We're able to take stack combinations and run them through the test harness automatically. Then we're able to use our SIM to come up with configurations that are suited for each of the permutations. It's not just about supporting the stack, it's about the whole process of being able to automatically test, configure, deploy and update it. It's pretty sophisticated in the background.

 
Also from IT Business Edge: Leveraging Open Source
Leveraging Open Source gives you a comprehensive view of open source adoption in the enterprise. From Linux's growing role in the mid-tier server market to open source corporate blogging software, the open source movement is making inroads in the enterprise. Click here to sign up!

By the Numbers

20 percent
Respondents that had experienced data loss due to lost or stolen tape media, according to a recent survey of IT executives by Asigra.

Triple
According to an Infonetics Research survey, Voice over WLAN implementations will triple by 2007.

94 percent
Portion of the world's notebooks and desktops on which Microsoft Windows runs, according to research firm IDC.
Source: PC Magazine

Breaking Headlines

TechWeb: Linux started its revolution with Web servers and continued onward to the desktop. While this battle is still developing, the mobile platform is in the crosshairs. Open Source Development Labs, along with its star employee, Linus Torvalds, has assembled a group of companies in an effort to develop standards for a cellular and mobile Linux platform. The group includes industry giant Motorola as well as MontaVista, PalmSource, Trolltech and Wind River. Overcoming the lack of vendor-neutral development for mobile Linux should open up the market for the OS significantly, according to OSDL and analysts quoted here, when major handset makers no longer have to invest in major in-house development for the Linux OS.

CRN: Many companies may have learned a great deal about their disaster recovery plans with hurricanes Rita, Katrina and Wilma, but they haven't had time to implement changes. Thankfully, local solution providers are ready to provide assistance. Miami-based 4IT helps businesses shut down in the face of a hurricane warning or other looming disaster. The process begins about 36 hours before the storm is due to hit and continues right up to the last hours. 4IT says recent storms have prompted new interest in updating disaster recovery plans and setting up remote locations in other parts of the United States.

InfoWorld: IBM has signed a deal with VMware to create the Virtualized Hosted Client product. The product targets IBM's BladeServer platform that enables 12 to 14 virtual desktops to run per blade. For its part, VMware software creates virtual machines that allow users to run multiple desktops with multiple operating systems. This deal continues the push to utilize thin clients with the benefit of centralized management and taking advantage of often underutilized server resources.

Network World: Dell is adopting dual-core processor technology in its server line. It begins with the lower-end servers; testing, certification and validation of its more powerful servers will take longer, Dell says. The 1850, 2800 and 2850 PowerEdge, and the 1855 blade servers will be the first to receive dual-core processors. Dual-core technology allows two processors to be placed on one chip, resulting in a boost in performance and a decrease in power requirements.

Emerging Trends

eWEEK: HP will offer continuous data protection (CDP) capabilities to its customers via Mendocino's RecoveryOne recovery management product, according to a new agreement between the two firms that is intended to shore up HP's storage business. The agreement begins with this offering and continues with placing the HP name on the products in the future, culminating in integration with other HP products. The CDP offering will provide rollback as well as specific point-in-time recovery options to recover from any disaster. HP's announcement takes some of the air out of rival EMC's sails; it's also planning a CDP offering involving Mendocino's RecoveryOne technology.

NewsFactor Network: Companies are clamoring for large-scale wireless networks or WLANS. Current wireless technology was not designed to meet existing user demands. It works for small areas like personal homes and small offices, but delivering to larger areas presents many problems. IT engineers are faced with the difficult goal or order to make it work. They face capacity, access, interference and QOS issues. The industry must rethink the technology and use the cellular model to make it work, according to this article.

Line56.com: Microsoft has entered the storage market with the Systems Center Data Protection Manager product for Windows 2003/2000 and Windows Storage servers. It provides basic data backup and recovery for a failed server — the most mature segment of the storage market. The features are less than impressive, says an Enterprise Management Associates analyst. This is especially true when considering most companies require some type of archiving capabilities. Of course, Microsoft has entered many markets in this manner. It is not beyond the realm of possibility that Redmond still has plans to purchase what is necessary to bolster this and similar products.

IT Business Edge: Optimizing Infrastructure
Issue 43, Vol. 3
DISCLAIMER: At the time of publication, all links in this e-mail functioned properly. However, since many links point to sites other than itbusinessedge.com, some links may become invalid as time passes.
This e-mail is sent by: NarrowCast Group, LLC, 124 N.First St., Louisville, KY 40202
Copyright ©2003-2005 NarrowCast Group, LLC. All Rights Reserved.

Hot Solutions
IronMail Secure Anti-Virus Gateway
Citrix Access Gateway Universal SSL VPN Appliance
Adonix X3 ERP Manufacturing, Distribution and Supply Chain Management
ViewWise Document Management Solutions
Search entire
IT Solution Directory

powered by

IT Best Practices
Guides and Templates


Strategic IT Planning and Governance

Building a Comprehensive Disaster Recovery Plan

IT Operations Guide
 

Optimizing Your IT Infrastructure

 

Securing Your IT Environment

Policies and Procedures
IT Operations Essentials


IT Operations Guide

  IT Planning Bundle
  2005 IT Compensation Study
  Strategic Outsourcing Framework
Outsourcing Process Templates
PortfolioStep Portfolio Management System

Training Products
IT and Management Skills


IT Manager Development Series

  IT Management Essentials Bundle
IT Management Development Mega Pack
PortfolioStep Portfolio Management System
  Strategic Outsourcing Framework

SPONSORED RESOURCES
Free 30-day Trial from Intuit QuickBase
Manage projects, sales, IT and more. Control access to data. Perfect for mid-size and large companies.
Your E-Mail System: Asset or Liability?
White paper explains how ILM solutions can help you face the most pressing need in regulatory messaging compliance.
How to Determine IP Telephony TCO
White paper outlines a flexible method for uncovering the hidden costs of IT telephony.
How The "Mobile Edge" Supports True Mobility
Read how a new architecture provides mobility, security and convergence for today's networks.

Business Case Kits
Background and Templates


VoIP Business Case Resource Kit

  Spam Filtering Business Case Resource Kit
  Blade Server Business Case Resource Kit
  CaseBuilder for IT Initiatives

Research
Consultant Rates

Free for Subscribers!
Don't budget IT projects in the dark! Find out what contractors are charging for the skills you need by querying our database of more than 12,000 consultants and firms.

Click here to begin your research now!

IT Security
Guidelines and Tools


Building a Comprehensive Disaster Recovery Plan

 

Security Manual Template

Disaster Recovery Plan Process Kit
  Securing Your IT Environment Best Practices Methodology
  Firewalls: The InfoWorld Test Center Product Guide

Info-Tech Research
Premium Analyst Reports
 


How to Select a Security Outsourcer

  A Strategy for CRM Selection
  Dissecting .NET for for IT Decision Makers
  Enterprise Wireless Networking: A View to the Future
  Linux on the Desktop
  Portals: Separating Myth from Reality

Find Related Technology Solutions
Electronic Mail/E-mail Management
RFID
Midframe/Midrange Servers
Entry Level Servers
Application Servers
SAN/NAS/RAID
Operating Systems and Subsystems
Change and Configuration Management
Remote Administration
Database Planning and Implementation
Search entire
IT Solution Directory

powered by

Find Related
IT Contract Resources
Find consultants and contractors with the skills you need in your area!
Data Backup
Windows 2003 Server
Windows NT Server
Hardware/OS
SAN Design
SAN Support
Network Systems Manager
Networking
Fiber Optics
Search entire
Contractor Database
Get listed now!
Consultants or Firms

Weekly Reports

About the Editor

Tony Patton has been active within the IT industry for over a decade with duties including technical support, application development and technical writing. He has published two books focusing on application development and is a frequent contributor to industry journals. You can reach him at security@itbusinessedge.com.
   
 
   

0 Comments:

Post a Comment

<< Home