July 04, 2015

Recovering from a Storage System Failure
Protecting from storage system failure requires more than just copying data from point A to point B. To meet any reasonable recovery expectation requires that a secondary storage system be available to start the application on. The good news is secondary storage is very affordable today and these systems can play a larger role than just being a standby storage system for the primary storage system. But before implementing the secondary storage system, the IT planner needs to understand what the acceptable recovery point (RPO) and recovery time objectives (RTO) will be for the applications counting on that system. Once the RPO and RTO is understood IT planners will know what method they should use to get data to the secondary storage system and what type of secondary storage system they should buy.


When Big Businesses Collaborate in the Cloud, Rapid Innovation Will Follow
The industry can also expect to witness accelerated technological advancements and innovation — when big businesses collaborate, rapid innovation will inevitably follow. Competitive divides between managed cloud and commodity cloud are growing; businesses need to understand which is right for their needs. Those who don’t have either the in-house expertise or the inclination to develop it are wise to choose a managed cloud solution, for efficiency and to guarantee uptime. Competitive collaboration plus partnerships through channel programs up and down the stack drive value for end customers. In order to drive success with the majority of the SMB through Enterprise market, we all need to consider partnerships.


Coffee Shops and Home Routers Could Offer Nearby Phones a 4G Data Connection
It encodes data in the same way as the LTE technology used by cellular networks today, but is designed to be used over the same part of the radio spectrum as Wi-Fi and has roughly the same range. The company says it can provide faster, less glitchy connections than Wi-Fi because LTE was developed for cellular networks where performance and reliability is more crucial. MuLTEfire opens new possibilities because the radio bands that Wi-Fi uses are not reserved for the exclusive use of any company. LTE is used today only by cellular networks on radio bands licensed from governments at costs of millions or billions of dollars. MuLTEfire is also different in that—as with Wi-Fi—a MuLTEfire hotspot can serve any device, regardless of which cellular carrier it is a subscriber to.


What’s the Difference between M2M and IoT?
To quote Mark Andreessen, “Software is eating the world” in industry after industry and it’s no different in ours. Old school SCADA (Supervisory Control and Data Acquisition) hardware is being consumed by Internet of Things software. Often people ask, “What’s the difference between M2M and IoT?” Besides the scope of the networks – M2M lives on a local area network or no network while IoT lives on a wide area network – the other major difference is SCADA consists of proprietary hardware like programmable logic controllers whereas the heart of IoT is software.


Why the Internet of Things won't be about the 'things'
“If you think, ‘Oh, I’ll never need that,’” pointing to a slide depicting the Apple Watch, “get that out of your system.” Forrester surveyed consumers about the Apple Watch upon its release for preorder in April, and 26%—representing about 50 million people in the United States—said they expect to own a smartwatch someday. What’s more, “8% want their next car to be a self-driving car, and they don’t even exist yet,” McQuivey said. “This is a consumer base that has learned the lesson of the last 10 years: ‘New stuff is going to come out, and it’s going to benefit me,” he added. “We are all early adopters now.”


Planning Cloud Analytics: conceptual architecture alternatives
Alternative architectures will result in cost variations for a cloud analytics solution. Choosing an optimal Cloud analytics architecture requires consideration of key tradeoffs described below. In addition, it requires consideration of factors such as skills, licensing, complexity, and maintenance. ...
In contrast to placing all essential components on a single CSP’s platform, distributing the components among multiple CSP platforms allows leveraging the strengths of product offerings available through each separate CSP. This approach necessitates consideration of costs associated with multiple CSPs as well as careful evaluation of architecture due to the potential for increased complexity.


Singapore wants to be a living lab for smart startups
“Singapore has always positioned itself as a great base for global companies,” he says when we meet for coffee on his visit to London. “We’re working hard to make it a great base but for startups and we’re talking about companies that have the opportunity to be big because people often comingle ‘SME’ and ‘startup’ and really they’re night and day.” Leonard says that this is a great time to foster startups: “You can be anywhere in the world and you don’t need to fill it up with infrastructure.” However, he says he’s not interested in building some California clone convoy. “One thing we’re not trying to do is mimic Silicon Valley. We have some good raw materials such as the intersection of universities and businesses, investment capital and high mobile use, and that gives us nice young talent and companies that want to tap into that.”


Why trust, rather than security, could be the bigger barrier to Google cloud adoption
“Once in the Google cloud, you have no idea where your data is. You don’t and won’t know when it’s being moved as Google looks to ensure that data is stored efficiently and regularly shifts data from one location to another to maximise resources,” he added. Hall said, as there is a risk their data could fall under the jurisdiction of another country with all the shifting around. Another concern, aired by a Computer Weekly reader, was that a company the size of Google is likely to be a top target for hackers, despite its assurances about the security resources it has in place to protect its platforms. “I have no doubt Google will have better security resources, but it will also be one of the top companies in the world on that target list,” the reader said.


Conditional Compilation in Universal Apps
Conditional compilation is the process of defining compiler directives that cause different parts of the code to be compiled, and others to be ignored. This technique can be used in a cross-platform development scenario to specify parts of the code that are compiled specific to a particular platform.Conditional compilation allows the compiler to skip some parts of the source code when compiling based on the conditional clauses. The #if ,#endif #elif and #else directives are used for conditional compilation. These directives add conditions to parts of a source file. With the use of these directives we can keep a single source file.


eBook: Problem Management
So what is problem management and what does it aim to achieve? And how is it different from incident management? This extract from Michael G Hall’s book, Problem Management, an implementation guide for the real world, explains how problem management differs from incident management and looks at the differences between reactive and pro-active problem management. The book draws on the principles of ITIL.



Quote for the day:

“Being a leader is making the people you love hate you a little more each day.” -- Patrick Ness

No comments:

Post a Comment