Leveraging a Virtualized Data Center to Improve Business Agility – Part 2

Leveraging a Virtualized Data Center to Improve Business Agility – Part 2

Improve Business Agility – Part 2

Read Part 1…

The Micro-Data Center and Converged Cloud

It is possible to build a cloud from the myriad services available today in many different ways. But, fundamentally, the goal is to utilize the most price performant hardware and networking bound by software to dynamically compose usable, stable, and secure computing resources. If you have set about the procurement and evaluation process in the past year, you will understand how difficult that has become, with services that address variable portions of the stack, leaving a maddening mix-and-match challenge with no single vendor responsible for the resulting cloud architecture.

Designed to mitigate these issues, converged infrastructure solutions, like VCE’s vBlock, NetApp’s Flexpod and Morphlabs’ mCloud DCU compose compute, storage and networking into one dynamic cloud system.

A dedicated converged infrastructure solution employs a “share-nothing” architecture. There are many concerns when an Enterprise deploys on clouds, public or private, chief among them price/performance, security, efficiency and quality-of-service (QoS). Utilizing a “share-nothing” architecture in which an enterprise runs its cloud on dedicated hardware alleviates most of these concerns. When not sharing infrastructure in a cloud an Enterprise is guaranteed QoS and can remain compliant with HIPAA or PCI

From a service provider perspective, a dedicated converged infrastructure solution offers an innovative Enterprise business model in the increasingly crowded IaaS market. One service provider can service multiple enterprise clients securely while still offering all of the benefits of a typical public cloud, including scalability, elasticity and on-demand capacity.

An enterprise can subscribe to a dedicated converged infrastructure solution, either behind its own firewall or remotely from a Service Provider, as a hosted private cloud. Critically, dedicated converged infrastructure solutions that include Dynamic Resource Scaling can expand capacity by provisioning additional Compute or Storage Nodes, as needed.

Performance will always be an issue on shared hardware, such as in a public cloud. The networking itself, especially over the Internet, is part of the performance problem. This has prompted a move to the more modular hyperscale computing architecture being delivered today. For further performance enhancements, trends in SSD-based options are proliferating, though the mCloud DCU is the first cloud solution to employ SSDs in compute as well as storage. With this architecture as the basis for consumption of cloud resources, the question becomes how can we optimized utilization and performance.

Cloud bursting and Carrier ethernet

To mitigate the security, integration, compatibility, control, and complexity concerns associated with bursting to the public cloud, Dynamic Resource Scaling (DRS) technology is meant to scale hosted private clouds.

DRS provides cloud bursting capability to a Virtual Private Cloud (VPC). With DRS, your applications burst to excess capacity that is exclusively dedicated to your environment. In addition to providing remote compute resources, DRS also provides access to remote storage. According to Forrester Consulting, “cloud-using companies are starting to accept cloud bursting as a means to help further reduce costs for their cloud environments and increase efficiency. The dynamic combination of external cloud resources with spare capacity on-premises is a key strategy to achieve this goal,” from The Next Maturity Step for Cloud Computing Management.

The major difference between cloud bursting and Dynamic Resource Scaling is that DRS implements a private cloud which bursts to a pool of dedicated resources, adding them to your private cloud, unlike the typical cloud bursting hybrid of private to public cloud. Having dedicated hardware guarantees Quality of Service, performance, and security.

Spare Compute and Storage farms can be accessible both locally and remotely.

Users can monitor their resource usage from the user interface and add additional compute capacity when needed, as specified by their site policy. Application traffic is load balanced by the virtual load balancer, which will route traffic to the additional VMs.

The benefits of the Dynamic Resource Scaling topology are:

Addressable Capacity – Capacity can be accessed remotely over ethernet

Fault Tolerance – Potential for cross-regional fail-over increases fault tolerance

Uniformity – Unlike cloud bursting where you burst to the public cloud, with mCloud DRS you are utilizing excess capacity from mCloud resources. Therefore, the user interface, tools, and infrastructure are the same as your private cloud, giving you one portal to manage and scale your private cloud on-demand

Security – Enterprises burst to private, unshared resources so your data is more secure

Flexibility – With mCloud DRS, Tier-1 applications with security and integration constraints can utilize bursting capability, whereas typical cloud bursting is often limited to non-secure, less integration intensive applications

In traditional cloud bursting, enterprises with a private cloud burst by adding virtual machines or storage from a public cloud, perhaps storing data in more than one datacenter – introducing vulnerabilities at the network and geographic levels. DRS essentially expands the virtual private cloud (a micro-datacenter) into a software-defined virtualized datacenter. With the entire infrastructure virtualized at the level of the datacenter, even networking efficiencies can be gained on top of utilization and true private cloud elasticity, leading to savings passed on to both operators and consumers.

Service Providers globally are leveraging their relationships with each other to increase the benefits of Hosted or Virtual Private Cloud. This is shown in Figure 4 as well as with VMware’s vCloud Data Center model in which service providers that are deploying VMware can share capacity.

If an enterprise in Los Angeles requires more compute or storage capacity, it can be provided from excess local capacity or from excess global capacity. This has the benefit of increasing utilization of hardware to gain maximum efficiency for the Service Provider and allowing high-performance cross-regional failover options.

For efficient and cost effective long distance bursting and sharing of resources, high-speed low-latency connections are required. Carrier Ethernet is a new technology that has allowed providers to achieve this. .

Carrier Ethernet Exchanges allow ethernet networks to exchange data over telecom networks. A Carrier Ethernet Exchange provides end-to-end ethernet service. This requires only one protocol (ethernet) which increases data integrity and efficiency. This gives the cloud user access to their remote, private cloud resources over a private network connection or Layer 2 VPN. Remote access to public cloud resources is still provided over the internet.

The advantages of Carrier Ethernet, versus the public internet, are that cloud traffic is secure and controlled, and performance is better and also more predictable.

By Winston Damarillo/CEO and Co-founder of Morphlabs

Winston is a proven serial entrepreneur with a track record of building successful technology start-ups. Prior to his entrepreneurial endeavors, Winston was among the highest performing venture capital professionals at Intel, having led the majority of his investments to either a successful IPO or a profitable corporate acquisition. In addition to leading Morphlabs, Winston is also involved in several organizations that are focused on combining the expertise of a broad range of thought leaders with advanced technology to drive global innovation and growth.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…