Leveraging a Virtualized Data Center to Improve Business Agility – Part 2

Leveraging a Virtualized Data Center to Improve Business Agility – Part 2

Improve Business Agility – Part 2

Read Part 1…

The Micro-Data Center and Converged Cloud

It is possible to build a cloud from the myriad services available today in many different ways. But, fundamentally, the goal is to utilize the most price performant hardware and networking bound by software to dynamically compose usable, stable, and secure computing resources. If you have set about the procurement and evaluation process in the past year, you will understand how difficult that has become, with services that address variable portions of the stack, leaving a maddening mix-and-match challenge with no single vendor responsible for the resulting cloud architecture.

Designed to mitigate these issues, converged infrastructure solutions, like VCE’s vBlock, NetApp’s Flexpod and Morphlabs’ mCloud DCU compose compute, storage and networking into one dynamic cloud system.

A dedicated converged infrastructure solution employs a “share-nothing” architecture. There are many concerns when an Enterprise deploys on clouds, public or private, chief among them price/performance, security, efficiency and quality-of-service (QoS). Utilizing a “share-nothing” architecture in which an enterprise runs its cloud on dedicated hardware alleviates most of these concerns. When not sharing infrastructure in a cloud an Enterprise is guaranteed QoS and can remain compliant with HIPAA or PCI

From a service provider perspective, a dedicated converged infrastructure solution offers an innovative Enterprise business model in the increasingly crowded IaaS market. One service provider can service multiple enterprise clients securely while still offering all of the benefits of a typical public cloud, including scalability, elasticity and on-demand capacity.

An enterprise can subscribe to a dedicated converged infrastructure solution, either behind its own firewall or remotely from a Service Provider, as a hosted private cloud. Critically, dedicated converged infrastructure solutions that include Dynamic Resource Scaling can expand capacity by provisioning additional Compute or Storage Nodes, as needed.

Performance will always be an issue on shared hardware, such as in a public cloud. The networking itself, especially over the Internet, is part of the performance problem. This has prompted a move to the more modular hyperscale computing architecture being delivered today. For further performance enhancements, trends in SSD-based options are proliferating, though the mCloud DCU is the first cloud solution to employ SSDs in compute as well as storage. With this architecture as the basis for consumption of cloud resources, the question becomes how can we optimized utilization and performance.

Cloud bursting and Carrier ethernet

To mitigate the security, integration, compatibility, control, and complexity concerns associated with bursting to the public cloud, Dynamic Resource Scaling (DRS) technology is meant to scale hosted private clouds.

DRS provides cloud bursting capability to a Virtual Private Cloud (VPC). With DRS, your applications burst to excess capacity that is exclusively dedicated to your environment. In addition to providing remote compute resources, DRS also provides access to remote storage. According to Forrester Consulting, “cloud-using companies are starting to accept cloud bursting as a means to help further reduce costs for their cloud environments and increase efficiency. The dynamic combination of external cloud resources with spare capacity on-premises is a key strategy to achieve this goal,” from The Next Maturity Step for Cloud Computing Management.

The major difference between cloud bursting and Dynamic Resource Scaling is that DRS implements a private cloud which bursts to a pool of dedicated resources, adding them to your private cloud, unlike the typical cloud bursting hybrid of private to public cloud. Having dedicated hardware guarantees Quality of Service, performance, and security.

Spare Compute and Storage farms can be accessible both locally and remotely.

Users can monitor their resource usage from the user interface and add additional compute capacity when needed, as specified by their site policy. Application traffic is load balanced by the virtual load balancer, which will route traffic to the additional VMs.

The benefits of the Dynamic Resource Scaling topology are:

Addressable Capacity – Capacity can be accessed remotely over ethernet

Fault Tolerance – Potential for cross-regional fail-over increases fault tolerance

Uniformity – Unlike cloud bursting where you burst to the public cloud, with mCloud DRS you are utilizing excess capacity from mCloud resources. Therefore, the user interface, tools, and infrastructure are the same as your private cloud, giving you one portal to manage and scale your private cloud on-demand

Security – Enterprises burst to private, unshared resources so your data is more secure

Flexibility – With mCloud DRS, Tier-1 applications with security and integration constraints can utilize bursting capability, whereas typical cloud bursting is often limited to non-secure, less integration intensive applications

In traditional cloud bursting, enterprises with a private cloud burst by adding virtual machines or storage from a public cloud, perhaps storing data in more than one datacenter – introducing vulnerabilities at the network and geographic levels. DRS essentially expands the virtual private cloud (a micro-datacenter) into a software-defined virtualized datacenter. With the entire infrastructure virtualized at the level of the datacenter, even networking efficiencies can be gained on top of utilization and true private cloud elasticity, leading to savings passed on to both operators and consumers.

Service Providers globally are leveraging their relationships with each other to increase the benefits of Hosted or Virtual Private Cloud. This is shown in Figure 4 as well as with VMware’s vCloud Data Center model in which service providers that are deploying VMware can share capacity.

If an enterprise in Los Angeles requires more compute or storage capacity, it can be provided from excess local capacity or from excess global capacity. This has the benefit of increasing utilization of hardware to gain maximum efficiency for the Service Provider and allowing high-performance cross-regional failover options.

For efficient and cost effective long distance bursting and sharing of resources, high-speed low-latency connections are required. Carrier Ethernet is a new technology that has allowed providers to achieve this. .

Carrier Ethernet Exchanges allow ethernet networks to exchange data over telecom networks. A Carrier Ethernet Exchange provides end-to-end ethernet service. This requires only one protocol (ethernet) which increases data integrity and efficiency. This gives the cloud user access to their remote, private cloud resources over a private network connection or Layer 2 VPN. Remote access to public cloud resources is still provided over the internet.

The advantages of Carrier Ethernet, versus the public internet, are that cloud traffic is secure and controlled, and performance is better and also more predictable.

By Winston Damarillo/CEO and Co-founder of Morphlabs

Winston is a proven serial entrepreneur with a track record of building successful technology start-ups. Prior to his entrepreneurial endeavors, Winston was among the highest performing venture capital professionals at Intel, having led the majority of his investments to either a successful IPO or a profitable corporate acquisition. In addition to leading Morphlabs, Winston is also involved in several organizations that are focused on combining the expertise of a broad range of thought leaders with advanced technology to drive global innovation and growth.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…