As IT professionals working within Large Enterprise environments and Data Centres we are constantly bombarded with new industry terminology. This can sometimes be a way of grouping similar concepts and approaches but when terminology takes hold then we are often guilty of “washing” every approach with the same detergent (so to speak). “Cloud” has probably been the most recent prevalent example of this but now we are increasingly met with the world of “Software Defined”. Software Defined Data Centre, Software Defined Networks, Software Defined Storage and Software Defined WAN – essentially insert your own word and hey presto it’s now Software Defined.Read More
Rewind 30 years, the 1980s - an era of terrible fashion, big hair but the start of organisations embracing technology driven by the desire for connectivity to the distributed estate, linking offices, branches, and retail outlets adopting point-of-sale systems. It was a time of low bandwidth requiring high security to protect the passing of sensitive information to and from the data centre; initially deployed over the network by X.25, then ISDN, with things really starting to gather pace with the evolution of MPLS.Read More
- Ryan Coombes, Gyrocom’s Technical Director talking about what’s really going on in IT departments wrestling with outsourcingRead More
'I beg your pardon?" Another Basil Fawlty communication issue (Fawlty Towers)
I travel, and I stay in a lot of hotels and every one of those has been better than Fawlty Towers.
However, when booking for the week away, one of the websites that I use, aside from Tripadvisor, is “HotelWifiTest.com”.
Because once I’ve slung my bags down onto the hotel bed, I am no longer satisfied with being subject to a broadcast schedule and T.V. controller, I hate to admit it, but I have become one of the “I want it, and I want it now” Millennials (albeit I am far too old to actually be one). I could be watching anything from The Walking Dead to Parks & Recreation to YouTube’s latest IT Infrastructure doodle video; no matter what it is, one thing is for certain…I have no time or patience for buffering! I thought “buffering” had been consigned to the past along with dial up modems and AOL.
“We didn't get any messages, and Captain Blackadder definitely did not shoot that delicious plump-breasted pigeon." – Lieutenant George to General Melchett and Captain Darling
In the series “Blackadder goes Forth”, set in the trenches of WW1, Edmund Blackadder avoids multiple types of messages for the company to “go over the top”. These messages come in the form of a telegram (addressed to “Catpain Blackudder”), telephone (the wrong number and latterly, a very poor connection), and a carrier pigeon (General Melchett’s beloved Speckled Jim).
Businesses today are faced with communication problems similar to that of General Melchett:
- Visibility – How does the Enterprise know whether their network is performing as it should to support their applications?
- Performance – How does it ensure that it gives its applications the quality of bandwidth they need?
- Choice – How can a business achieve the necessary flexibility to choose its connection method?
- Cost – OK, the analogy falls down here although the death of Speckled Jim came at great emotional cost to General Melchett. Regardless, how can businesses maximise network performance in a cost efficient way?
Cybercrime is perhaps the most serious threat to businesses today, yet many executives still underestimate the risk that it poses to their organisation.Read More
First and foremost, thanks to everybody who took the time to visit our stand at London’s IP Expo last week. The event was a great opportunity to network and provided an excellent platform for showcasing Gyrocom’s expertise in the Software Defined Data Centre (SDDC).Read More
A lot has been written about how today’s I.T. Infrastructure security models are broken. The days of securing the perimeter and trusting everything and everybody inside are gone. To make such a statement may seem bold, but you only have to look to a recent Forrester survey* identifying the top three corporate security breaches as (1) the loss/theft of corporate assets; (2) inadvertent misuse by an insider and (3) external attacks targeting corporate systems, to understand that such a statement is far from bold and in fact a matter organisations should start to consider more seriously.Read More
Software Defined Networks seems to be the big buzzword of the moment, well it certainly is in our office.
SDN brings core functions such as centralised control and automation to your virtualised networks, allowing new environments and networks to be spun up in a matter of minutes.
However with new technologies, there are always new security concerns.Read More