Voice+Data August 2012
-
Upload
westwick-farrow-media -
Category
Documents
-
view
225 -
download
2
description
Transcript of Voice+Data August 2012
PP255003/05951
AUGUST 2012VOL.11 NO.6 FLASH — SAVIOUR OF THE
I/O UNIVERSE?UPSIDES OF IPv4 EXHAUSTION
UNCLE SAM WANTS YOUR DATA
BUT CAN HE GET AT IT?
www.VoiceandData.com.au 3 // AUGUST 2012
contents
8 30
222218
Regulars4 Some thoughts
6 Talk from the top
12 SNIA ANZ
14 From the analysts' table
16 @work Case studies featuring technology from
NEC Business Solutions, Logicalis, Fusion Broadband, MyNetFone, Staging Connections and Riverbed.
26 Building blocks The latest products and services driving convergence.
34 In my opinion
Your copy of Voice+Data is now available as an online eMag.
http://www.voiceanddata.com.au/latest_issuesNOW in DIGITAL!
©iS
tock
phot
o.co
m/E
ric
Hoo
d
©iS
tock
phot
o.co
m/e
wg3
D
Articles8 A cloudy outlook for storage? Cloud storage can provide cost savings and increased flexibility. But with security breaches and data sovereignty breeding doubt in customers’ minds, the future of cloud storage is not certain.
24 The dangers of hosting data offshore With the US Patriot Act, the DMCA and similar, storing your data with an offshore company may allow foreign entities to rifle
through said data - without your knowledge.
30 The upside of IPv4 exhaustion With IPv4 addresses running out, organisations are already under pressure to transition to IPv6. But there are some positives to making the move.
On the Cover: ©iStockphoto.com/ilbusca
4 // AUGUST 2012
Some thoughts
A.B.N. 22 152 305 336www.westwick-farrow.com.auHead OfficeCnr. Fox Valley Road & Kiogle Street,(Locked Bag 1289) Wahroonga 2076 Australia Ph +61 2 9487 2700 Fax +61 2 9489 1265
Editor Andrew [email protected]
Contributing Editor Merri [email protected]
Chief Editor Janette Woodhouse
Publisher Geoff [email protected]
Art Director/Production Manager Julie Wright
Art/Production Tanya Scarselletti, Nettie Teuma, Colleen Sam
Circulation Manager Sue [email protected]
Copy Control Mitchie Mullins, [email protected]
Advertising Sales
NSW, QLDLiz Wilson Ph 0403 528 558 [email protected]
VIC, SA, WALachlan Rainey Ph 0402 157 167 [email protected]
New ZealandGemma Burr Ph 0800 44 2529 [email protected]
USA Huson International Media East Coast Ph +1 212 268 3344West Coast Ph +1 408 879 6666 [email protected]
UK Huson International Media Ph +44 1932 56 4999 [email protected]
AsiaLachlan Rainey Ph +61 (0) 402 157 [email protected]
If you have any queries regarding our privacy policy please email [email protected]: For unregistered readers, price on application.
All material published in this magazine is published in good faith and every care is taken to accurately relay information provided to us. Readers are advised by the publishers to ensure that all necessary safety devices and precautions are installed and safe working procedures adopted before the use of any equipment found or purchased through the informa-tion we provide. Further, all performance criteria was provided by the representative company concerned and any dispute should be referred to them. Information indicating that products are made in Australia or New Zealand is supplied by the source company. Westwick-Farrow Pty Ltd does not quantify the amount of local content or the accuracy of the statement made by the source.
March 2012 total CAB audited circulation (Aust + NZ)6782 readers (76% personally requested)
Andrew [email protected]
Printed and bound by Webstar +61 2 9748 0020Print Post Approved PP 255003/05951 ISSN No. 1446 - 2230
MOUNTAINS AND MOLEHILLS
The IT industry is no stranger to hyperbole. And IT loves to sort things into black and white.
So things are either fantastic, unique game-changing, paradigm-upset-ting solutions (for which you should open your wallet and pay top dollar), or they are terrifying boogymen that you should fear (and to dispel them you’ll need to open your wallet and pay top dollar). There is no middle ground.
Or, at least, that’s what the spin would suggest.
In reality, there are way more molehills than there are mountains. Most things - products and problems - will sit some-where in the middle of this spectrum of good and bad. Very few products deserve a place under “must buy today, at any price,” and very few problems deserve to be given ‘red alert’ status.
Furthermore, each problem and solu-tion will sit in a different spot on the spectrum for every different company on the planet. Few companies will have the exact same list of priorities.
Data sovereignty provides a good example of this hyperbolic, polarising trend. Depending on who you listen to, it’s either the end of the world - and various governments around the globe will soon have access to your sacred data - or it’s absolute nonsense and you should ignore the issue entirely. But the truth is more complicated than that. Throwing your lot
in with either camp - saying either that it’s the worst thing in the world, or that everyone should ignore the issue - is taking the easy way out.
I won’t spoil the details (head to page 24 to read one opinion about it, then to page 8 to read the full story), but I will say that there is no single perspective that applies to every organisation. There is no simple, one-size-fits-all answer.
There are various reasons why IT loves hyperbole and polarisation.
Firstly, marketing. If a marketer can convince you that a particular thing lies at either end of our spectrum, they’ve made a sale.
Secondly, the media. Instead of rep-resenting issues with their natural com-plexity, it’s much easier to classify a complicated thing as either good or evil.
Both of these are symptoms of one thing: human psychology. The human brain likes putting things into polar categories, because it’s cognitively simpler than as-sessing every tiny detail of a complex situation. This leaves you with extra brain cycles with which to construct shelter, search for water, pursue prey or find a mate. This concept of cognitive simplicity and polarisation underpins one theory for how various forms of prejudice work.
All of this is worth keeping in mind whenever you hear a statement that l ies at ei ther end of the fantast ic/ terrifying spectrum.
4 // AUGUST 2012
www.VoiceandData.com.au6 // AUGUST 2012
Talk from the top
A HERCULEAN EFFORTMerri Mack
How many IT people get to walk along the beach to their workplace? As we shiver in the southern states, Garry Rich takes a 20-minute walk to his office on the Gold Coast. There, as Group General Manager IT, he oversees IT for the Mantra Group, a collection of accommodation providers.
The Mantra Group includes the Mantra, Peppers and BreakFree properties and resorts, and includes more than 100 properties in Australia and New Zealand.
Rich’s responsibilities encompass the insourced end-to-end provision of IT management for cor-porate, IT and related businesses. He oversees the four functions that comprise IT: the Technical Assistance Centre, which provides IT support to 3500 users; the IT Operations Team, responsible for data centre, infrastructure and platforms; the In-house Development team, which looks after web development, the booking engine and APIs; and the Application team, with a focus on the Group’s central reservation system.
It’s a complex business, and the rapid growth from 17 properties six years ago when Rich joined to the current 100-plus properties has meant that there have been considerable challenges. Not the least of these is centralising the systems to be able to manage the properties effectively. A centralised inventory system provides last room availability, according to Rich.
“At times Mantra has added anywhere from 10 to 20 properties at one time, which has thrown up a gamut of IT challenges, including a proliferation of vendors, server sprawl, storage capacity limits and a raft of different IT systems, each of which required simplifying and centralising.
“An excellent team of 38 people over the four IT functions has helped in meeting the chal-lenges,” said Rich.
Faced with storage constraints, business ex-pansion, as well as IT beginning to hit the power and cooling limitations of existing data centre facilities, Mantra Group looked at a greenfields solution. After engaging with several vendors, Rich selected a Cisco/NetApp FlexPod system that virtualised the network, storage and server infrastructure.
“The new equipment has made a huge differ-ence to our energy consumption. We have been pleased with how effective the FlexPod system has been in reducing our power draw. Our power and cooling bills have been reduced and this goes directly to the bottom line.
“The system has been live for a year now and we have been delighted with the benefits,” said Rich.
Mantra Group has outsourced power and cool-ing requirements by taking an anchor tenancy in a new data centre facility on the Gold Coast. This means IT can focus on managing the systems, network and infrastructure.
Technology trends such as virtualisation and the cloud are active enablers of the business. Mobility, social media and BYOD are all embraced by Rich. Mobility is a point of difference for the Mantra Group, with the Peppers Broadbeach Hotel providing iPads in the rooms for its guests.
Guest feedback is now public, posted on Facebook, Twitter and TripAdvisor. These social media tools influence booking decisions.
“The business has implemented tools to quickly gauge the online sentiment of our hotels and al-lows us to benchmark against competitive sets. It’s somewhat like a social health check, without becoming a drain on operational resources,” said Rich.
Rich certainly relishes his role at Mantra Group, particularly the excitement that comes with rapid growth.
“Mantra Group has been willing to try new things. It makes for great exposure to cutting-edge ideas, products and services. I work in a small team of great people who put in a herculean effort to achieve our goals,” said Rich.
Living right on the beach means he and his family enjoy the beach lifestyle. Rich would love to have time to do more cycling but does make time for reading using an e-reader.
"The business has implemented tools to quickly gauge the online sentiment of our hotels and allows us to benchmark against competitive sets. It’s somewhat like a social health check, without becoming a drain on operational resources." - Garry Rich, Mantra Group
Garry Rich joined Mantra Group in August 2005. In his current role as Group General Manager IT, Rich is responsible for developing and delivering information communication technology, services and infrastructure for the Group. With more than 15 years’ experience in the IT industry, Rich has an extensive understanding of the management of IT systems, hardware, software and data centres. Rich holds a Graduate Certificate in Computing, an MBA as well as numerous industry certifications.
8 // AUGUST 2012 www.VoiceandData.com.au
Cloud storage
A CLOUDY OUTLOOK FOR STORAGE?Andrew Collins
The “cloud” has become one of the most used (perhaps overused) terms in IT discussions today. Vendors and service providers love to explain how the various
forms of cloud computing can free your workers from the chains of their desktops, free up the time of your IT staff, and allow you to move your IT spending from CAPEX to OPEX.
Public cloud storage tools - remote storage, usually accessed via the internet, paid for in an on-demand fashion - have been available for some years now. Broadly speaking, they all offer remote data storage, are (usually) accessed via the in-ternet and are paid for in an on-demand fashion.
The various tools have naturally fallen into a couple of categories and use cases for the different varieties of cloud storage have become evident.
Use casesWhile these tools all have the broad strokes in common, they tend to fall into one of two dis-tinct categories, differentiated by the complexity of the services surrounding the storage itself. Each category lends itself to specific use cases.
Tools in the first category are simple remote storage, with very little in the way of features or services surrounding that, and are often referred to as ‘dumb’ cloud storage. These services really
only consists of storage located in some remote data centre, and not much else - it’s just a place to store your files that isn’t your office. Custom-ers typically access the storage they’re renting via an API.
Examples include Amazon S3, Ninefold’s Cloud Storage and Rackspace’s Cloud Files.
Given that it’s essentially just a remote dumping ground for your data, this dumb service lends itself to less cerebral storage tasks, like simple backup.
It’s commonly accepted that good backup prac-tice involves storing your backups in a different location to your primary storage. After all, backing up your business’s data to a NAS inside your own office is no good if a fire rips through your office, destroying both the backup along with the primary copy of your data. Dumb cloud storage offers a relatively easy way to back up your company’s precious data to a remote location, without the need for ferrying tapes around the place.
Clive Gold, Marketing CTO at EMC, which provides hardware to cloud storage providers, says there are “a lot of organisations who want an off-site backup, who’ve recognised the ‘tape and truck’ is dead and gone, but they don’t have a substantially secure and reliable second site” who are using dumb storage in this way. Dumb cloud storage can also help with recovery after
Vendors claim cloud storage offers a range of benefits to organisations, including cost savings and increased flexibility. But with things like security breaches, data sovereignty and the US Patriot Act breeding doubt in customers’ minds, the future of cloud storage is not certain.
©iS
tock
phot
o.co
m/E
ric
Hoo
d
8 // AUGUST 2012 www.VoiceandData.com.au 9 // AUGUST 2012
Cloud storage
"Given t ha t i t ' s e s s ent ia l l y ju s t a r e m o t e d u m p i n g ground for your data, this dumb service lends itself to less cerebral storage tasks, like simple backup."
a disaster. If such a calamity does wipe out your primary storage, it’s a relatively simple matter to transfer the backup from the cloud back to your new machines.
This sort of storage has applications for content distribution. “eBay is a big user of that. Whenever anybody uploads a photo, it’s stored on that sort of infrastructure,” says Gold.
But according to Dr Kevin McIsaac, analyst at Australian firm IBRS, this category of dumb cloud isn’t all that exciting for most organisations.
“The whole idea about backing up to the cloud - I hear about it from the vendors but nobody’s asking me about it. Vendors are all very excited about it - I don’t get a strong sense of that from my clients,” he says.
He says that there are “some” small and “some” big customers using the technology, but “it’s a niche”.
“The idea of a cloud storage infrastructure that you generically leverage like you leverage a SAN - I don’t see it [happening now or taking off in the future].”
This is because plain storage itself isn’t all that useful. “For large volumes of data, you want to have your compute next to your data.”
As for using dumb cloud storage for backup purposes, it’s hard to find a cloud service that offers a better value proposition than simple tape backup.
“I don’t know that the [dumb cloud storage] prices are that competitive. Tape libraries these days are pretty darn cheap. And if you have two data centres, backing up from one to a tape library in the other is about the cheapest way you’ll ever do a backup.
“On the other hand, if you’re a small organisation and you don’t have that stuff, well, why do you have your infrastructure anyway? Get somebody else to run it and get them to worry about that.
“There are use cases for it, but it’s not a broad use case,” McIsaac says.
A smarter optionThe second category of public cloud storage comes in the form of collaboration tools. While dumb cloud storage is simply some space for your data in a remote data centre, tools in the second category include a bunch of features around that basic storage, to help workers collaborate. The most famous example of this category comes in the form of consumer tool DropBox.
Users typically download and install a local client, which presents the remote storage as a local directory on the user’s machine. Multiple users across the organisation can each treat it much like they would a local folder, creating and editing files within it, without having to know anything about how it all works. These tools
typically allow users to access previous versions of files saved on the shared drive and include functionality to allow sharing of files with people in or outside of the organisation. They also usu-ally offer a web interface, allowing access to the remote data even on machines that do not have the software installed.
In fact, these collaboration tools are so popular among consumers that they’re starting to bring them into the workplace themselves, using them without the knowledge of IT management. Given the potential for these tools to lead to a data leakage, this causes concern for CIOs and IT managers.
So these enterprise-grade collaboration tools add in the extra features that make CIOs and IT managers happy.
“It gives the best of both worlds. It gives the users the freedom they want, but it gives the CTO some measure of control around versioning, security and monitoring,” says Peter James, Chair-man and co-founder of Australian cloud service provider Ninefold.
Both Ninefold and Rackspace offer these enterprise-grade Dropbox alternatives, imagina-tively named Ninefold Cloud Drive and Rackspace Cloud Drive.
According to IBRS’s McIsaac, these cloud-based collaboration tools offer a much more interesting proposition for businesses than dumb cloud storage.
“It is storage, but what it really does is serve a really specific purpose, about how to make sure the files I need are available where I need them. It’s not really about ‘storage in the cloud’, it’s about synchronising data across multiple platforms,” he says.
IBRS, itself a small businesses comprising several analysts that work in their own environs, makes use of several such cloud-based collabora-tion tools, including Sugarsync and Google Drive.
Causes for concernWhile these tools may offer increased utility or productivity, many businesses still baulk at trust-ing an outside organisation with sensitive busi-ness data. Given that security breaches at large organisations are making headlines more and more frequently, and given that small hosting companies have had wide-scale breaches recently, concerns about such data breaches seem fair enough.
But according to IBRS’s McIsaac, large cloud organisations typically have environments that are more secure than those small companies that experienced breaches.
“If you go to a larger-scale, more professional organisation - like Google, or Microsoft, or Fujitsu, or Telstra - would they have a better environment? Yes, I believe they would. Would it be bulletproof? No, probably not. But they’d have more robust processes and such,” he says.
www.VoiceandData.com.au10 // AUGUST 2012
“What’s required is for the vendors to have standards, or you actually have an audibility clause in your contract. So a third party will actually audit the processes [of the cloud provider] up front, and then ongoing, and give you an opinion about whether or not the processes are sufficient to meet the security or availability guarantees that they make.”
Of all the concerns customers have about cloud storage, data sovereignty is far and away the one most talked about and the one that receives the most press. But opinion is mixed on how relevant it really is.
In simple terms, ‘data sovereignty’ refers to the idea that any data is subject to the laws of the country in which it is stored. So, the idea goes, if you upload a bunch of documents to a data centre located in China, that data is now in the jurisdiction of Chinese law and could potentially be seized by Chinese authorities, should they be allowed to under Chinese law, and should they have reason to look at it.
This would not be the case, the theory says, if you’d kept that data on a hard drive in your organisation’s Australian head office.
Beyond that, the theory says that if the com-pany that stores your data for you is based in another country, your data is again subject to that country’s laws - even if it’s stored in a data centre in your own country.
Much of the noise regarding data sovereignty surrounds the US Patriot Act, an Act of the US Congress that was signed into law less than two months after the September 11 terrorist attacks, ostensibly to give US authorities greater power to fight terrorism.
These extra powers make it easier for US law enforcement agencies to extract information from American companies. The bottom line is, if American federal agencies want access to your data for some reason, the Patriot Act makes it even easier for them to get it.
Ninefold’s James stresses the importance of data sovereignty.
“We are Australian owned, as a business, and we are subject only to Australian law. We have all of our data, all of our equipment, based here in Australia. So the data is subject to Australian jurisdiction in terms of the data sovereignty,” says James.
This is important “particularly if you have data that is sensitive, and that could be government data, it could be educational, it could be financial or personal data”.
“If a business has any concerns about where its data could finish up, then it should have its data stored in a data centre that is in Australia, managed and owned by a company that is Austral-ian. That’s the purest and safest way of ensuring
that you know where your data is, and who has access to it, both physically and by law,” he says.
However, EMC’s Gold suggests that even if a service provider were ordered to hand over a customer’s data to any third party, this data would be meaningless without the keys to unlock it, which, if the cloud provider is set up in the most secure fashion, they would not have. Only the customer would have that ability, as only the customer should have the relevant encryption keys.
“With encryption, the digital rights management and the information controls that we have as part of our security suite, we can have a cloud provider who cannot get access to your data, no matter what,” Gold says. “Practically, it’s impossible.”
Rackspace, a US-based cloud provider whose data centres are located in the US, UK and Hong Kong, says the Patriot Act itself is nothing par-ticularly special.
“It is something that’s standard in every country. It’s law enforcement. If you’re breaking the law, or suspected of breaking the law, any government has the ability to serve a court order, or to request another government that they have a legal enforcement treaty with to serve a court order, to get a hold of that [data],” says Mark Randall, Country Manager for Australia and New Zealand, Rackspace.
“If you are suspected of breaking the law, and the government had a reasonable case against you, then, if they wanted to get hold of your data, it really wouldn’t matter who you were hosting with or which country you were hosting [in],” he says.
IBRS’s McIsaac says: “Quite frankly, if an American company wants your data, they go to the Australian courts, and the Australian courts end up coming and taking the data. Or, if it’s an Australian company, ASIC will.”
In any case, he says, the data sovereignty debate is the wrong argument to have. Instead, consider the difference between security (the chance that your data is leaked to a law enforce-ment organisation) and risk (the damage to your company should such a leak occur).
In other words, assess the potential damage of having foreign governments combing through your data and weigh that against the benefits of offshore hosting (which may include price).
“Do a risk/cost benefit trade-off. So there’s a very small risk that that data will be made publicly available. What if I could [use cloud storage] in a much better service, at a much lower cost, would the business be willing to have that trade-off? In most instances, the business would say yes, depending on the data,” he says.
"If an American company wants your data, they go to the Australian courts, and the Australian courts end up coming and taking the data. Or, if it’s an Australian company, ASIC will." - Kevin McIsaac, IBRS
Remember: Voice+Data is not a lawyer! If you’re concerned about foreign entities (including govern-ments) pawing through your data, you should obtain legal advice from an actual legal expert.
Cloud storage
www.VoiceandData.com.au12 // AUGUST 2012
FLASH - SAVIOUR OF THE (I/O) UNIVERSE?Clive Gold, CTO Marketing at EMC and Vice Chair of SNIA ANZ
If you read certain sections of the media you would not be wrong in thinking that flash storage is like ‘the cavalry’ coming over the hill to save the day, but is it going to be the industry saviour?
There is no doubt that I/O has become the biggest bottleneck in the computing model. This is as a result of the difference between the performance growths of ‘silicon’ vs
mechanical technologies over time. Today, compared to 10 years ago, a CPU produces about 1000x the number of cycles per second, compared to the I/O rate of a mechanical drive, which is essentially the same (2x if you are generous!). Hence the entry of the enterprise flash storage device!
For a few years now, leading storage vendors have been incorporating flash storage into their arrays, as a means to deliver performance, while mechanical disks provide the low-cost storage. With the right amount of automation the cost of storage systems can be reduced, in some cases around the 30% mark. However, there is even more benefit to using flash as a storage medium if we rethink the whole thing. New start-up companies are beginning to engineer storage products from the ground up to use flash as the storage media and the initial results are fantastic.
As an example of this change, consider the RAID mechanism for protecting data. One of the funda-mental constructs of the current RAID algorithms is that you are dealing with a set of physical disk drives. The algorithms have therefore been designed to understand the locality of the data, and, in es-sence, attempt to overcome the physical limitations of physical drives, such as seek times.
Now consider flash memory, where there are no seek times and, in fact, there is no concept of ‘devices’. Add flash and you get more capacity! With these factors in mind, the data protection algorithms can we rewritten to produce better protection with less overhead - certainly dramatically different to the reads and writes that have to be done in a traditional, mechanical disk, RAID system. So what is the downside? Well, this makes performance of
these devices harder to define. Our training has us looking at seek, access and transfer times on mechanical disks to compare performance metrics, but when it comes to flash devices, the parameters are different. Think about the operation of a flash device in a storage array. When it’s new, and the buffer is empty, and it’s merrily writing to the next cell, everything is working smoothly. Then the buffer fills, and it needs to flush before it accepts new requests. Either that or the flash fills and it has to ‘garbage collect’ to find the cells that can be overwritten. Then, there is the impact of the ‘intelligence’ built into the flash device as well as when and how will it perform these operations.
Each solid state drive (SSD) manufacturer in the past has utilised different measurement meth-odologies to derive performance specifications for the products they make. Thus, it’s been difficult for buyers to fairly compare the performance specifications of SSDs from different manufac-turers. This is the reason SNIA decided to take the complexity out of this situation and to create a series of independent standard conformance tests, which will allow buyers to quickly and ac-curately compare these devices. The Solid State Storage Performance Test Specification (SSS PTS) defines a suite of tests and test methodologies to measure the performance characteristics of SSDs. The SSS PTS provides performance meas-urements that may be fairly compared to those of other SSDs measured the same way, in the same environment. For further information visit http://www.snia.org/forums/sssi.
This is just the beginning of a major shift to-wards flash storage, and as we move into the ‘big data’ world, it is technologies like this which will enable us to make best use of all the data that is available, and make a profound impact on the world we live in!
" N e w s t a r t - u p c o m p a n i e s a r e beginning to engineer storage products from the ground up to use flash as the storage media, and the initial results are fantastic."
Snia anz
14 // AUGUST 2012 www.VoiceandData.com.au
from the analysts' table
Natalie Ng, Market Analyst, IDC
BI tool growth
In 2011, IT ana lys is
firm IDC estimated the
Aust ra l i an Bus iness
Intelligence (BI) software
market generated $324.12
m i l l i on i n so f tw a re
licensing and maintenance
revenue. This has resulted
in a revenue growth of 5.4% from 2010
to 2011 and is forecast to grow at 8.0%
CAGR between 2011 to 2016.
“Growth for BI tools in 2011 has
been primarily driven by the continuous
efforts of Australian organisations to
consolidate existing IT infrastructure,”
said IDC Market Analyst Natalie Ng.
“In addition, there have been more
upgrades on existing BI tools seen,
as opposed to purchasing newer
solutions.
“An end-user survey, by IDC, has
found, over the past years, adoption
rates of BI tools has increased in
impo r t ance . Bus inesses a re
recognising the benefits BI tools can
deliver in an increasingly complex
environment and is leveraging them
to make intelligent, better-informed
business decisions,” said Ng.
End-User Query and Analysis
software is primarily used for its report
building capabilities and has 82.8%
share of the BI market. Advanced
Analytics software is also a component
of the BI market, but a growth inhibitor
has been its perceived premium
price tag and the insufficient supply
of business users with appropriate
analytical skills to use such tools.
In spite of this, Advanced Analytics
applications in Australia have 17.2%
share of the overall market for BI.
“With the forthcoming carbon
tax, Australian businesses will look to
employ analytic tools in an effort to
improve business efficiency to reduce
carbon emissions,” said Ng.
In the near term, IDC expects
prepackaged analytic applications and
business analytics appliance offerings
to be favoured by SMBs for their ease
and low cost of deployment, and SaaS
solutions for their low total cost of
ownership (TCO).
Peter Ryan, Practice Leader IT Services Team, Ovum
Home agent market to double
The number of outsourced
home agents will double by
2015 thanks to innovations
around security, vertical
market expansion and
forays beyond the traditional
US market, according to
analyst firm Ovum.
In its report, ‘Profiting from home
agents in CRM outsourcing’, Ovum
predicts that the number of agents
working more than 20 hours per week
will reach nearly 130,000 in the next
four years, growing predominantly in
the US (88% share).
There will be increased penetration
in other English-speaking countries,
with Australia being viewed favourably
among home agent vendors looking
for regional expansion, thanks to its
commonalities with US economic and
work culture.
Despite this growth, the model will
remain ‘niche’ until enterprise concerns
around data security, agent supervision
and the difficulties in building ‘team
atmosphere’ across a virtual model
are overcome.
“Outsourced home agents
have garnered a strong reputation
for providing end users with robust
customer experience, one that ideally
drives repeat business and referrals,”
said Peter Ryan, practice leader of
Ovum IT services team.
“With customer satisfaction and
increased revenues identified as key
business goals for enterprises, vendors
of home agent services are well placed
to take on work from enterprises that
are more discerning than ever about
execution quality and lowering costs.”
“Any firm looking to enter or expand
its footprint in the outsourced home
agent market should target sectors
in which interest in this business
model is significant, as well as those
that require higher-margin processes,
including healthcare and insurance-
related work,” said Ryan.
“Non-voice, multichannel CRM
work should also be considered, in
order to take advantage of the superior
agent quality and sophistication that the
virtual model offers.”
Krishna Baidya, ICT Industry Manager, Frost & Sullivan
Asia Pac contact centres bloom
Asia Pacific contact centres
recorded a 9.7% growth
in agent seats, reaching a
figure of 2.5 million in 2011.
This number is expected to
grow at a compound annual
growth rate (CAGR) of 8.1%
to reach 4.0 million by 2018.
14 // AUGUST 2012 www.VoiceandData.com.au 15 // AUGUST 2012
from the analysts' table
©iS
tock
phot
o.co
m/R
ené
Man
si industrymovements
Telecoms consumer protectionT h e A u s t r a l i a n a n d
Communications Media Authority
(ACMA) has agreed to register
the revised Telecommunications
Consumer Protections (TCP) Code,
which ACMA says will give telco
customers greater protection
on issues such as bill shock,
confusing mobile plans and poor
complaints handling.
The Communications Alliance
welcomed the decision and
simultaneously announced the
appointment of Deirdre Mason
as the Independent Chair of
Communications Compliance -
the company newly created to
foster and monitor industry-wide
compliance with the TCP Code.
Mason was previously a director
of the Telecommunications Industry
Ombudsman (TIO), the Chief
Executive of the Committee for
Sydney and a long-time Telstra
executive. She is one of three directors
appointed to Communications
Compliance (CC) by the Board
of Communications Alliance.
John Stanton, Comms Alliance CEO,
said the new TCP Code was the
most comprehensive upgrade of
consumer protections ever achieved
in the telco sector.
“This code heralds a sea change
in the telco consumer experience in
Australia,” Stanton said.
Michael Lee, Communications
Alliance Chair and former Federal
Minister for Communications, will
also serve on the Communications
Compliance Board.
Social network acquisitionMicrosoft has acquired Yammer
for US$1.2 billion, in an attempt
to gain inroads into the enterprise
soc ia l network ing market .
The move follows a recent trend
in enterprise software, with many
vendors adding social elements to
their products, seeking to tap into
the strong consumer appetite for
social networking.
According to Frost & Sullivan, Asia
Pacific is expected to demonstrate
the highest growth in the global
contact centre outsourcing in 2012
and beyond.
The Australian contact centre
market experienced moderate
growth, with seat numbers growing
more than 4% from 2010 to reach
220,000 in 2011.
However, it is expected to witness
a compound annual growth rate
(CAGR) of 2.6% through 2018.
“Businesses are increasingly
focusing on a consistent and superior
customer experience to serve as
a differentiating factor. Coming
back from the economic downturn,
companies are dedicating greater
efforts towards customer satisfaction
and retention,” said Krishna Baidya,
ICT Industry Manager at Frost
& Sullivan.
Australian contact centres are
relatively faster in terms of adopting
new technology compared to other
markets in the APAC region, the
analyst firm said. Australian centres
have already started to adopt call
analytics and monitoring tools, as
well as workforce management tools,
to streamline their operations and
increase productivity.
But while agent numbers are likely
to escalate across the region, the
market will also experience significant
attrition, the firm said. The attrition
rates in the Asia Pacific contact centre
market will be higher than the rates
in other markets due to high stress
levels and career opportunities in
other industries. In 2011, the average
attrition rate for the Asia Pacific
contact centre market as a whole was
approximately 19.1%.
Richard Gordon, Research Vice President, Gartner
Worldwide IT spend to reach $3.6 trillion in 2012
Worldwide IT spending
will reach US$3.6 trillion
in 2012, an increase of
3% over 2011’s figure of
US$3.5 trillion, according to
analyst firm Gartner.
“While the challenges
facing global economic
growth persist - the eurozone crisis,
weaker US recovery, a slowdown
in China - the outlook has at least
stabilised," said Richard Gordon,
research vice president at Gartner.
“There has been little change in
either business confidence or consumer
sentiment in the past quarter, so the
short-term outlook is for continued
caution in IT spending.”
But while the projected growth for
overall IT spending may seem meagre,
Gartner expects enterprise spending
on public cloud services to grow from
US$91 billion worldwide in 2011 to
US$109 billion in 2012, an increase of
almost 20%.
And by 2016, the firm expects
enterprise spending on public cloud
services to reach US$207 billion.
“Business process as a service
(BPaaS) still accounts for the vast
majority of cloud spending by
enterprises, but other areas such as
platform as a service (PaaS), software
as a service (SaaS) and infrastructure
as a service (IaaS) are growing faster,”
Gordon said. Gartner expects IT services
spending to reach US$864 billion
in 2012, a 2.3% increase from 2011.
www.VoiceandData.com.au16 // AUGUST 2012
IP PBX BRINGS STAFF OUT FROM UNDER THE DESK
@work
“It’s easy to track down anyone anywhere in the organisation. Mobile staff like the voicemail-to-email integration. All extensions can set up a multiparty conference.” - Luke Haber
Summerland Credit Union has overhauled its call centre and internal communica-tions infrastructure, replacing its ageing telephony system in the process.
The credit union, with its head office and call centre in the northern NSW town of Lismore, was using three brands of PABX across its 13 branches, located from Grafton to Coolangatta, and a brand mix of analog and digital PABX systems. It was difficult to make changes or move handsets without in-depth technical knowledge of each system. And it was also difficult getting support and spare parts for the 13-year-old system at head office, where the call centre was located.
In evaluating three systems as part of an open RFI, Luke Haber, IT Manager, Summerland Credit Union, said: “The design was driven by the operational needs of our staff and had to cater for business expansion. The advanced call centre functionality called for integrated software and an appropriate IP PABX.”
The call centre wanted to merge three in-bound teams, improve delivery of incoming member calls and provide advanced automated reporting. The solution also had to factor in the inconsistent capacity and high cost of communications network services in regional Australia.
The company ultimately implemented a solution from NEC. Thanks to the Netlink functionality of the solution, four branches are soon to use the centralised
integrated IP telephony network at head office, with 100 staff currently using the system. Twenty agents in the call centre provide internal support and inbound member contact.
It is envisaged the credit union will be able to spread any overflow to other branches to cater for peak loads and future growth. The remaining two branches are scheduled to have the SV8100 communications server with the Netlink feature installed later down the line.
A full line audit and deletion of unused lines is saving Summerland $35,000 per year in rental alone. An internal cabling upgrade has underpinned the installation of the NEC infrastructure. Following implementation, Summerland soon experienced increased call quality between branches and a reduction of faults.
Staff are using and/or customising Presence templates to record their location and availability, meaning calls can be directed quickly and accurately to the most appropriate person. This has led to faster response times for inbound queues and better contact management between staff and members.
“The NEC call centre software maintains accurate service levels with excellent reporting. We have measurable improvements in productivity and accountability for our call centre staff,” Haber said.
As the phone is integrated with Outlook most of the input and interaction is from the PC, which drives the handset. The IP PABX system at head office allows handsets to be moved without reprogramming.
“It’s easy to track down anyone anywhere in the organisation. Mobile staff like the voicemail-to-email integration. All extensions can set up a multiparty conference,” Haber said.
From the perspective of Haber and his four-person IT team, the NEC solution has a very low management overhead, with equipment supplier North Coast Telephone Systems (NCTS) contracted to provide all equipment and software support.
Haber said: “My goal is to have us managing our service providers, not under desks relocating phone handsets.”
NEC Business Solutions
Contact info and more items like this at wf.net.au/Q271
18 // AUGUST 2012 www.VoiceandData.com.au
@work
Emergency services resuscitates WAN
The V ic tor ian Emergency Serv ices Telecommunications Authority (ESTA) has upgraded its WAN to a fault tolerance architecture WAN service, in order to cope with increasing call traffic, additional agency responsibilities, strong forecasted population growth across metropolitan, regional and rural Victoria, as well as the relocation of one of three emergency communications centres.
The organisation had to complete the upgrade while maintaining emergency services support to the Victorian community.
ESTA provides the critical link between the community and Victoria’s emergency services organisations (ESOs) through Triple Zero (000) call taking and dispatch. With 24/7 operation, it is one of the few agencies in the world that manages communications for the full range of emergency services including police, fire, ambulance and SES.
In addition to providing emergency call taking and dispatch services, ESTA manages
three purpose-built networks to support the needs of the ESOs. These services are: the metropolitan-based Mobile Data Network (MDN); the Metropolitan Mobile Radio (MMR) service; and the Emergency Alerting System (EAS).
The technology network supporting ESTA’s delivery of service is both physical (telecommunications) and virtual (call handling and dispatch processes) and is, therefore, the backbone of providing ESTA’s services.
ESTA elected to augment its network in-house team to support delivery of the upgrade and purchased Cisco infrastructure, for both the WAN upgrade and the data centre relocation, from ICT solutions and services provider Logicalis, who would provide support in the design, provision and build of the new network.
Specifically, ESTA requested consultancy for the upgrade of three metropolitan
and regional emergency communications centres, one of which would be relocated during the course of the year. It also needed to support mission-critical, business as usual at its Network Operations Centre (NOC) and the new network needed enough scale to support ad hoc surges in demand, as required by ongoing projects.
Logicalis delivered the project over a six-month period in late 2011, with 600 ESTA operations staff, at the time, using the network continuously during the upgrade. It also delivered the network in time for the relocation of the emergency communications centre in Burwood East, to avoid additional costs.
Complicated in itself, the centre needed an entirely new design, new physical cabling, testing, production and support. Logicalis provided maintenance and 24/7 management for ESTA’s network through its NetManage infrastructure management service which manages people, processes and technology in combination.
“Given ESTA operates 24/7 emergency support, there was, categorically, no room for failure or error during this project.” said Mark Powell, General Manager of Technology, ESTA. “Many components contributed to its successful delivery, including our internal teams and the network itself.”
“From an external perspective, Logicalis provided precisely the right technology and consultancy to support us in executing a seamless project with multiple government and public stakeholders.
“That’s no mean feat. The best result we needed was no downtime and absolute quality of service to ensure the public could continue to access emergency services at all times.”
Logicalis
Contact info and more items like this at wf.net.au/Q545
index16 IP PBX brings staff out from under the desk
20 College halves phone bill with SIP trunking
18
Emergency services resuscitates WAN
22 Televising the revolution
20 Fusing five ADSL2+ lines into one
22 Diverting traffic with virtualised load balancing
18 // AUGUST 2012
Focus. Connect. Lead.
The World’s Most Important Gathering of CIOs and Senior IT Executives
As an IT leader, you have a unique opportunity to change the way your enterprise engages stakeholders, drives effectiveness and achieves results. At Gartner Symposium/ITxpo 2012, you’ll acquire deep new insight into every IT topic that matters to your organization, including cloud, social, mobile and information.
• In-depth coverage of the hottest trends and topics in IT and business
• 200+ analyst sessions, workshops and roundtables
• Networking with more than 1400 of your peers, including 400+ CIOs
• Over 50 knowledgable solution providers, all in one place
Guest Keynote Speakers
Success Through Simplicity: Apps for Everyone Dom Sagolla Co-creator of Twitter
A Real Fighter Private Damien Thomlinson Australian veteran of the Afghan war
Early Bird Offer!
Save $500Register before 14 September 2012
For more information and to view the latest agenda visit: gartner.com/au/symposium3 ways to register | Web: gartner.com/au/symposium | Email: [email protected] | Phone: +61 2 8569 7622
www.VoiceandData.com.au20 // AUGUST 2012
@work
College halves phone bill with SIP trunking
Fusing five ADSL2+ lines into one
Regional school Nowra Anglican College has implemented broadband bonding technology to increase broadband speeds from 11 Mbps to a maximum of 82 Mbps, and an average upload speed of 0.8 Mbps to a maximum of 22 Mbps.
The school has 750 students and approximately 100 teachers, support and administration staff, all of whom require internet access.
According to Andrew Warfield, ICT Manager and Systems Administrator for Shoalhaven Region Anglican Schools, the need for a good internet connection has increased over the last few years. With the existing system, users experienced dropouts and problems with https sites. “Nowra Anglican College is about five kilometres from the exchange, which results in greatly
reduced speeds, even though we do have ADSL2,” said Warfield. “I’m told that for every 500 metres you are from the exchange you lose 20% of the available speed.
“To try and cope with demand, we had four ADSL2+ services with a load balancing firewall/gateway. Our speeds would vary between 4 Mbps and 11 Mbps downlink and 0.8 Mbps uplink.”
The school installed broadband bonding from Fusion Broadband in January this year. The system employs packet-based load balancing algorithms that provide a sum of the connected services in both directions.
Since installing the new system, and adding just one extra connection, Nowra Anglican College can now attain speeds of 82 Mbps downlink and 22 Mbps uplink when using compressible data, and speeds of 25 Mbps when downloading uncompressed data. This is achieved using five ADSL2+ lines.
“We can actually use the internet without it crashing every day. While we still reach peak usage, far more can be done. There is now a single redundant internet connection, greatly reducing complexity and simplifying service management. According to Warfield, the technology will remain relevant even once the NBN is in place.
“Once the NBN hits our front lawn we will still use it for redundancy and aggregation; but until then we will be happy knowing we have the fastest speed we can possibly get in our area.
“Everyone is happy, no one more so than myself. Before this bonding technology there was no other option that was within budget: SHDSL was too expensive and slower; fibre was well out of range; and wireless options were slow and well out of budget as well,” Warfield said.
Fusion Broadband
Contact info and more items like this at wf.net.au/Q578
Arndell Anglican College has reduced its monthly phone bills by 50% and improved its voice service levels, thanks to a new SIP trunking service.
Arndell is a co-educational Primary to Year 12 school located in Oakville and is a member of the Sydney Anglican Schools Corporation.
“As a school we need to provide fast and efficient and reliable service to our parents,” said Rohan Smith, Head of IT Services, Arndell Anglican College.
As the school upgraded its data network in line with its long-term IT strategy, it decided it was also time to upgrade its telephony system.
“We previously had an old Commander PABX which had limited lines and limited features so we were unable to transfer calls effectively to the right locations in a time-efficient manner,” said Smith.
With no call transfer or voicemail features, staff were reduced to taking notes on paper and passing messages around by hand. This affected the school’s ability to provide a high level of service to the community. At the same time, the school found that its call costs were increasing, which led it to look for alternatives.
The school ultimately chose MyNetFone to update its telecommunications services to meet its communications needs. This was done in partnership with Vertel, Arndell’s data provider, which provided a dedicated link for the carriage of IP data and voice traffic.
MyNetFone provides a 20 SIP trunk service and an additional block of 100 direct-in-dial numbers (DIDs). The company also ported some of Arndell Anglican College’s existing PSTN numbers. The new system includes features such as ‘Follow Me’, to redirect incoming calls in case of PBX failure, and ‘Caller ID Overstamp’, displaying the school’s original PSTN number on outgoing calls.
Vertel provided the college with separate VLANs for voice and data. A direct peering arrangement between MyNetFone and Vertel was established via a Layer 3 connection. The college benefits from quality of service with voice traffic staying on-net and avoiding the public internet.
“We moved from five PSTN lines to 20 virtual lines with the MyNetFone SIP Trunk service and have reduced our phone bill by several thousand dollars as a result,” said Smith.
“In addition to reducing the calls costs, we found the most savings were on line rental. We’re now paying the one fee for the 20 lines as opposed to five line rental charges.”
This amounts to around a 50% saving on phone spend. The savings have been reinvested into other IT upgrades. The college has improved voice communications service levels, making it easier for parents to reach teachers within the college and for messages to be delivered.
MyNetFone Pty Ltd
Contact info and more items like this at wf.net.au/Q727
www.VoiceandData.com.au22 // AUGUST 2012
@work
Televising the revolutionThe NSW Teachers Federation was able to connect protestors at its recent Sydney-based stop work meeting to tens of thousands of teachers in regional areas across New South Wales, thanks to webcast technology.
Staging Connections provided the technology to connect more than 50,000 teachers across NSW with their counterparts at the NSW Teachers Federation Stop Work Meeting held on Wednesday 27 June at Sydney Town Hall.
More than 5000 teachers attended the main meeting site at Sydney Town Hall, with the Staging Connections’ team capturing the entire event and webcasting it live to more than 30 regional sites. Teachers throughout NSW met in RSL Clubs, town halls and other meeting areas to join their colleagues via live video feed.
Five cameras captured the action of the event, including speeches from the President of the NSW Teachers Federation, Maurie Mulheron, and members of the educational community. With a team of 19 working on the event, Staging Connections’ five technical directors and
14 crew controlled live crosses to audience members for reactions on what was being said by speakers.
Jason Nicholas, Digital Media Editor for the NSW Teachers Federation, said, “We used to broadcast via Sky Channel into pubs across the state and have now evolved into internet streaming. “It was a very sensitive and confidential event to plan and we felt confident that Staging Connections could maintain a high level of security from our initial discussions to the day itself.”
The live video stream allowed even smaller towns with limited internet connection to receive the high quality of delivery, while other locations watched in HD via adaptive bit rate technology.
“Overall, we were especially pleased with the professionalism of the whole crew,” Nicholas said.
Staging Connections
Contact info and more items like this at wf.net.au/Q577
Diverting traffic with virtualised load balancingHosting and managed service provider UltraServe has implemented load balancing software to improve resource utilisation and throughput, while minimising response time and avoiding overload.
Specialising in cloud and managed hosting infrastructure for many high-traffic e-retailer and media sites in Australia, the company required a load balancing solution that would allow transparent growth capability, enabling businesses to scale efficiently and cost-effectively.
“The situation was no longer sustainable and we became quite frustrated with the old and traditional load-balancing technology available. Not only was it old hardware, but also very expensive to maintain,” said UltraServe founder and CEO Samuel Yeats.
In 2011, UltraServe investigated the available load balancing options on the market and, after reviewing a number of vendors, decided on Riverbed Stingray Traffic Manager software.
Stingray Traffic Manager is a virtual application delivery controller (ADC) that provides flexibility and a single point of management for accelerating applications hosted on servers. It also equips network operators and developers with Riverbed Stingray TrafficScript software to create traffic management rules using global load balancing, bandwidth management, rate shaping and service level monitoring.
UltraServe integrated Stingray Traffic Manager into its cloud infrastructure and developed an autoscale functionality that allows its clients to automatically provision servers in response to load.
Since the implementation, UltraServe has noticed significant improvements to productivity and performance.
“Stingray has allowed us and our customers to scale more efficiently, at a much lower cost. A significant cost saving was experienced, which we are able to pass onto our customers,” said Yeats.
“Our customers are finding that they can achieve cost savings of 30 to 40% using the Stingray autoscale functionality to scale infrastructure in response to demand,” said Yeats. Customers are now also able to do anytime, anywhere upgrades and updates
with a single download and licence key.“A key promise of cloud computing is the ability to innovate at reduced
risk and cost. The flexibility of being able to scale up and down licensing allows the product to be used for short-term campaigns, market testing and innovation without the barrier of a significant capex investment,” said Yeats.
UltraServe and its customers have found that moving from physical load balancing appliances, with limited internal scalability, to a virtualised Stingray environment has created a very agile platform.
“In using the platform, our customers have been able to grow seamlessly up to 300%. Many start with a basic Stingray solution, then add features and scale out to a clustered active load-balancing environment, as required,” said Yates.
Riverbed Technology Australia Pty Ltd
Contact info and more items like this at wf.net.au/Q711
24 // AUGUST 2012 www.VoiceandData.com.au
Data sovereignty
THE DANGERS OF HOSTING DATA OFFSHORECarlo Minassian, Founder & CEO, earthwave
Cloud is often presented as a cure-all for data storage, because it combines ease of access with low cost. In addition, cloud offers the seeming security of
housing precious information off-site in purpose-built facilities not susceptible to natural disasters and power outage.
This perception has become so widespread that organisations, including many in government, are rapidly moving parts or all of their opera-tions to the cloud. While there are indications that some of the large early adopters, like IBM, are reconsidering the parameters (they recently forbade employee access to Dropbox and Apple’s iCloud), the momentum to the cloud is unlikely to be stopped, because the imagined savings are just too attractive.
Two years ago, the federal government in the United States began to urge its agencies to em-brace a ‘cloud first’ approach when it came to IT procurement. The goal was to lower costs, and today they are saving about US$5.5 billion every year. Given recent projections, if cloud first was adopted even more widely, those savings would rise to US$12 billion - almost the equivalent of NASA’s annual budget.
With numbers like this, it’s no surprise that cloud is becoming so dominant. It’s also no surprise that IT managers’ concerns are frequently shunted aside, especially when ‘hard’ savings numbers are weighed against security risks that are difficult - if not impossible - to assign a dollar figure.But these concerns must not be pushed aside. Any organisation - government or private sector
- that doesn’t become fluent in data security, is taking a sizeable risk. This is especially true if that organisation is based in Australia.
While there are numerous issues around cloud and data security, I want to focus on two of the most important: data sovereignty and the value of keeping things onshore.
Foreign lawThere is a strong out-of-sight/out-of-mind com-ponent to the cloud. It might seem like stating the obvious, but when your data is in the cloud, it is actually a ‘resident’ of a particular country. As such, it is governed by the laws of that country and those laws might be very different, and sig-nificantly less friendly, than those of Australia.
Michael Chertoff, the former head of the US Department of Homeland Security, has argued forcefully that organisations that handle private data should keep it onshore. Chertoff experienced first-hand how quickly data sovereignty can de-volve into a legal wrangle that puts critical and private information at risk. As a result of sweep-ing antiterrorism legislation, US law required that international airlines provide access to traveller information. From the European perspective, America was asking for protected information about its citizens.
This situation led Chertoff to conclude that data sovereignty and cloud goes well beyond protecting classified information and military secrets. He made a vivid point that can be ap-plied to Australia: “At all levels of government,
Hosting your data in the cloud offers several benefits for organisations, including easier file sharing among employees, easy remote backup and, in some cases, cost savings. But with the US Patriot Act, the DMCA and similar, storing your data with an offshore company may allow foreign entities to rifle through said data - without your knowledge.
©iS
tock
phot
o.co
m/e
wg3
D
24 // AUGUST 2012 www.VoiceandData.com.au 25 // AUGUST 2012
we store the working-day information that helps government function: email exchanges, calendars and the like. The scope of our government’s data holdings is as wide as the expanse and reach of government, and likely contains information that touches upon all aspects of American life [includ-ing driver’s licences, real estate data, birth and death records, etc].”
Chertoff was saying that it’s easy to forget just how big the scope of data storage is today. Some of it might be non-critical, but much of it is genuinely precious and needs to be treated like any other commodity. Where that commod-ity is stored and who has access to it matters a great deal.
Chertoff’s observations also apply to Australia, ironically in part because America’s own sweeping laws make offshoring Australian data in the United States something to avoid. Both the Patriot Act and the Digital Millennium Copyright Act (DMCA) have shown just how data stored in the United States is vulnerable to law enforcement intrusions.
The Patriot Act means that your data can be accessed and you probably will never know - in fact, in some cases, providers might not be al-lowed to tell their customers of such access. Moreover, US companies usually readily comply with even informal requests, known as National Security Letters (NSL), for such access to data.
Similarly, enforcement of the DMCA has led to dramatic cloud-shutdowns like the Megaupload case that should have made anyone using simi-lar services reconsider moving to another data storage solution. After all, while Megaupload was targeted for music and video piracy, a study by Palo Alto Networks showed that the service had greater use on corporate networks than Dropbox, YouSendIt and Box.net combined - all currently seen as ‘legitimate’ cloud providers.
Moreover, US-owned companies will also be forced to comply with these laws even if they are housing data in Australia. But the reality is that there are many bilateral agreements between Australia and the United States. If the US wants particular data, that data will often be given to them on a silver platter, regardless of whether or not it is being housed in a US-owned data centre.
But the issue of data sovereignty goes beyond the United States. Many leading organisations are starting to recognise that the country where data is stored is critical. Financial organisations tend to be especially sensitive to these issues because of regulatory issues. Andrew Stokes, Chief Scientist of Deutsche Bank Global Technology, recently said, “There are so many regulators and regula-tions - we need to be safe. Every geography has its own unique sector and laws.”
A familiar environmentFor most Australian organisations, there are substantial advantages to storing data onshore in an environment that is politically, economically, financially and even geologically stable and familiar. This involves business continuity (BC) concerns. After all, the organisation can better assess the robustness of data centres, especially when it comes to disaster recovery (DR) scenarios.
The Brisbane floods and the bushfires in Can-berra drove the point home that you need your DR facilities in different locations, because having two data centres in the same geographical region can still lead to prolonged downtimes. But, again, onshoring allows for the organisation to assess the best approach from a DR angle.
Additionally, on-shoring permits organisations to benefit from strong local security certifications such as ASIO T4, DSD HP and PCI DSS, which are essential for the highest level of data protec-tion. The ‘human factor’ and physical proximity is also critical. It matters that an organisation can see where their data physically resides, that they can visit data centre sites, get to know the people delivering their services and have access to senior engineers in their time zones.
Arguably, the starting point for data security begins well before you start worrying about data sovereignty. Government agencies and any organisation with sufficient reason to care about data security need to know that:
• data is being identified, classified and protected both physically and electronically;
• any person who may handle the data has ap-propriate security clearances;
• there is a defence-in-depth strategy in place;• threat detection and response, not just data
protection, is practised; and• the three postulates of security (confidentiality,
integrity and availability) are being enforced.While most, if not all, onshore cloud providers
will fall down on these counts, those organisa-tions that are scrupulous about their data can and should find private cloud providers that can meet their rigorous specifications. The cost might be higher and the ROI difficult to calculate, but data security means too much to be lost in the current rush to the cloud.
"Both the Patriot Act and the Digital Millennium Copyright Act (DMCA) have shown just how data stored in the United States is vulnerable to law enforcement intrusions."
Carlo Minassian is the founder and CEO of earthwave, an Australian provider of managed security services, security-as-a-service and ‘clean pipes’. Since starting the company in 2000, Minassian has helped establish earthwave as a security service provider serving hundreds of Australian businesses. He and his team blog at http://www.earthwave.com.au/blog/.
26 // AUGUST 2012 www.VoiceandData.com.au
UNIFIED STORAGE
The ReadyData 5200 is a uni-fied storage product targeted at SMBs and SMEs and includes cloud-managed data replication as a standard feature. The device is suitable for SMB virtualisation environments.
Users can leverage thin provision-ing in virtual environments, replicate files and databases to offsite locations, and re-cover data from unlimited point-in-time snapshots, via a graphic-based user interface. The device enables disaster recovery to limit downtime in the event of a network failure.
The product offers thin provisioning, compression and deduplication of block (SAN) and file (NAS) data; replication over 128-bit SSL connections for block and file data; unlimited snapshots for block and file data; and can scale up to 60 drives and 180 TB total capacity.
It features two 10 GbE ports and mixed configurations of SATA, SAS and SSD drives; backup software compatibility with major vendors like Symantec, Acronis, CommVault, StorageCraft, Veeam and Quest; virtual network interface support for powerful network traffic management; and virtualisation vendor certifications from VMware, Microsoft and Citrix.
Netgear Australia
Contact info and more items like this at wf.net.au/Q609
MODULAR TAPE LIBRARY
Oracle’s StorageTek SL150 modular tape library is a scalable tape library designed to meet the archiving and data protection needs of mid-sized and growing businesses. The modular tape library scales from 30 to 300 slots and up to 900 TB of capacity, giving users room to grow in a single tape library while reducing service, installation and capital expenditure costs.
The tape library offers management via a GUI, built on Oracle Fusion Middleware and Oracle Linux. Users can view and navigate drive, library and media information, without dealing with cumbersome file structure drill-downs, and capacity can be added quickly, using the library’s USB-based auto-discovery system to find new expansion modules.
The tape library supports a range of open systems environments. Operating systems and platforms include: Oracle Solaris and Oracle Linux, Oracle Exadata Database Machine, Oracle Database Appliance, Oracle’s SPARC and Sun x86 servers and Oracle’s Sun Storage.
Oracle Corporation Australia Pty Ltd
Contact info and more items like this at wf.net.au/Q709
ENTERPRISE CONTENT MANAGEMENT
OpenText Extended ECM Version 10 for SAP Solutions includes support for the SAP customer relationship man-agement (SAP CRM) and SAP supplier relationship management (SAP SRM) applications, among numer-ous other enhancements.
The solution has been designed to help enter-prises improve customer interaction efficiency by consolidating support docu-ments, such as contracts or email correspondence, in one place and making them available through the SAP CRM user interface. On the supplier side, it extends SAP supplier relationship management with vendor collaboration and content management inside the procurement processes of an organisation.
The addition of a social stream, called OpenText Pulse, allows team mem-bers to track, and quickly jump to, the most up-to-date content. It also allows people to connect to each other and see the status of content updates from across the organisation. This allows knowledge sharing and transparency as content is changed or added within core business processes driven by SAP solutions.
Other new features in-clude enhanced workspace access and permission con-trol based on SAP roles and authorisations, integration with the Microsoft Windows desktop and Office applica-tions, access to content via the SAP NetWeaver technology portal and ad-vanced OCR capabilities for scanned documents (searchable PDF).
OpenText
Contact info and more items like this at wf.net.au/N419
BACKUP AND RECOVERY
EMC has announced NetWorker Unified Backup and Recovery Software 8.0. The software has been enhanced with a streamlined architecture for improved performance and scal-ability. It also offers integration with EMC Data Domain deduplication storage systems, broadened support for Microsoft applications and multitenancy management which enables cloud service delivery.
A ‘Client Direct’ feature enables NetWorker clients to backup directly from the applica-tion client to disk, improving performance by up to 50%. DD Boost integration with the NetWorker client brings benefits to backup workloads while enhancing Data Domain system performance. Benefits include lower network traffic, integrated management with clone-controlled replication, and automated configuration, monitoring and reporting capabilities.
Microsoft data protection is enhanced with new capabilities for SQL Server, including sup-port for SQL Server 2012 and Granular Level Recovery for Exchange, SharePoint and Hyper-V.
EMC Corporation
Contact info and more items like this at wf.net.au/Q618
building blocksTHE PRODUCTS & SERVICES DRIVING CONVERGENCE
storage
26 // AUGUST 2012 www.VoiceandData.com.au 27 // AUGUST 2012
VIRTUALISED DATA CENTRE
Nutanix enables users to virtualise a data centre without requiring a SAN. It eliminates the need for network stor-age while still delivering the enterprise-class performance, scalability and required data management features.
The hardware and software solution provides complete server and storage capabilities required to run virtual ma-chines and store their data. The building block approach allows users to start with what is needed and add additional blocks as needs grow to scale-out a single system.
Features include: out-of-the-box capabilities - up and run-ning in 30 min and easy scale-out; elimination of network storage resulting in an immediate 40-60% reduction in
CAPEX, while providing highly advanced shared-storage capabilities; a smaller, more efficient converged architec-ture for server and storage translates to measurable OPEX reduction in adminis-tration, power and cooling costs.
Matrium Technologies Pty Ltd
Contact info and more items like this at wf.net.au/Q347
MEDIA SERVER
Interaction Edge is a combined gateway, media server and SIP proxy appliance designed to streamline enterprise IP telephony deployments.
The device provides gateway capabilities enabling con-nections between traditional trunk lines and voice-over-IP networks, and adds media server and SIP proxy functionality in a single appliance.
By combining functionality onto a single appliance, enter-prises and contact centres can simplify IT management and reduce costs.
The product is designed to work with Interactive Intelligence’s IP communications software suite, Customer Interaction Center CIC. The media server offloads the CIC application server by handling all audio processing for improved reliability and performance. Its SIP proxy helps to more effectively route calls between servers in enterprise IP telephony environments for increased operational efficiencies and remote survivability.
The gateway capabilities of the device are available in one-, two-, four- and eight-span increments for flexible scalability.
Interactive Intelligence Australia
Contact info and more items like this at wf.net.au/Q352
BUILDING BLOCKS
Ampec Technologies Pty Ltd Unit 1, 63-79 Parramatta Road, Silverwater, NSW 2128Tel: +61 2 8741 5000 E: [email protected] W: www.ampec.com.au
RG6RG11RG58
RG142RG174RG179RG213RG316
LMR® seriesLeaky cables
and moreU.FLSMABNCTNCN Type F Type and more ‘LMR® is the registered trademark of Times Microwave Systems’
28 // AUGUST 2012 www.VoiceandData.com.au
MOBILE DEVICE MANAGEMENT
ManageEngine Mobile Device Management is a module of DesktopCentral, an enterprise desktop management solution. Mobile Device Management extends centralised IT administra-tion to any iOS device, allowing businesses to use a single system for managing all of their desktop computers, laptops, iPhones and iPads.
Employees increasingly expect to handle their routine emails and communications on
their personal devices, whether they are in the office or working from home. Mobile Device Management features allow IT administrators to perform device scans, gener-ate asset management reports, modify device configurations and ensure corporate information and data policies are followed.
Security functionality built into the solution allows the IT team to remotely lock the iOS device or remotely erase data stored on the device in the event of theft. Asset tracking information can be automatically collected and reported, including app inventory, security settings, device hardware details and security certificates that have been installed.
Zoho Corporation Private Limited
Contact info and more items like this at wf.net.au/Q486
IM SECURITY
Symantec Instant Messaging Secu-rity.cloud (IMS.cloud), with support for Microsoft Lync, is now available. The product helps organisations that communicate using instant messag-ing platforms address their security and compliance issues.
IMS.cloud is designed to scan every IM sent to or coming from an organisation. Incoming messages, including attachments are scanned for viruses, worms and URLs which may lead to malicious Web sites. All incoming and outgoing mes-sages are also matched against the organisation’s acceptable use poli-cies. Any message that is malicious or suspicious or violates corporate policy is automatically blocked and the user is notified.
The solution includes a content control engine, malware protection, malicious URL detection, automatic message logging and configurable disclaimers. It helps meets regula-tory compliance by logging message transcripts. Cloud-based archiving is available for organisations with more stringent compliance needs.
The solut ion is cloud based, meaning no on-premise hardware and minimal software is required.
Symantec (Australia) Pty Ltd
Contact info and more items like this at wf.net.au/Q612
VIRTUAL CONTACT CENTRE
Telstra Global has announced its global Virtual Contact Centre (VCC) solution. The service offers companies access to a multichannel customer service experience with a single service level agreement. With the service, companies can scale their contact centre capabilities to accommodate initiatives such as new product launches, trials or peaks in customer demand, with no long-term commitment or new licence fees.
Accessed via Telstra Global’s Secure IP VPN, the VCC software can be updated or changed to update campaign scripts, add agents to different campaigns or activate remote agents. It also offers real-time CRM integration to direct customer calls to the right operator regardless of the contact channel used.
Organisations can pay for the service based on usage or flat fee.
Telstra Corporation
Contact info and more items like this at wf.net.au/Q613
BUILDING BLOCKS
28 // AUGUST 2012 www.VoiceandData.com.au 29 // AUGUST 2012
SOCIAL VIDEO
The Polycom HD video software is a group social video chat application that allows users to access their contact lists in popular consumer social platforms, including Facebook, Skype and gTalk (Google video), and conduct HD video chats regardless of the applications the other participants are using, or where they are.
Because the app combines contact lists from Facebook, Skype and gTalk, users can see who is online and invite them to an HD video chat simply by dragging or selecting them. Participants receive the video chat invitation within their pre-ferred messenger interface and they can simply click and join from within their browser - without downloading anything.
The free version of the app supports HD video chat with up to three partici-pants, as well as screen- and document-sharing so users can have face-to-face conversations while, for example, viewing a spreadsheet in a budget plan.
Polycom Global Pty Ltd
Contact info and more items like this at wf.net.au/Q608
SOFTPHONE
MyNetFone Desktop is a softphone application that offers voice and video com-munication on both Windows and Mac computers. The application utilises open standard SIP communication protocols.
The application is suitable for small to medium-sized businesses keen to leverage advanced phone features such as Microsoft Outlook integration and videocon-ferencing from a single user interface, without the up-front cost of feature-rich hardware or the inconvenience of multiple software applications.
Key features include the ability to record voice and video calls; add contacts during calls; and manage, sort and filter up to 3000 contacts. In addition, it lets the users rearrange the layout of the phone interface and hide the dial pad when not in use, allowing them to maximise their desktop space.
Remote workers can set up their laptop in any location with internet access and have a ‘remote office’, be part of call groups, be reached via 4-digit exten-sion from the head office and get voicemail and voicemail to email.
Employees working from home can be integrated into the company phone system and call hunt groups, without the expense of buying and shipping a desk phone to their home.
Enterprise features designed for business users include Auto Answer, workgroup capabilities and full auto provisioning with MyNetFone.
MyNetFone Pty Ltd
Contact info and more items like this at wf.net.au/Q614
BUILDING BLOCKS
RADIO FOR ENVIRONMENTS CONTAINING POTENTIALLY EXPLOSIVE GAS AND DUST
TR Hirecom has available to rent the Motorola MTP850Ex TETRA ATEX and IEC Ex, a suitable two-way radio for environments contain-ing potentially explosive gas and dust.
Features include: IP64 (Cat 2) rating; can be operated in gas zones 1 and 2 classified hazardous areas (Ex ib IIC T4); can be operated in dust zones 21 and 22 classified hazardous areas (Ex tD A21 IP6x ib D21 T90°C).
TR Hirecom hires two-way radios and systems including IS/FM/ATEX-rated radios for the security, events, construction, manufacturing and petrochemical industries. Its rental range includes: analog portable and
mobile two-way radios; Motorola MotoTRBO digital portable and mobile two-way radio; trunked and digital radio systems; iridium satellite phones; com-plete radio systems. The company also provides consulting and planning services.
TechRentals
Contact info and more items like this at wf.net.au/Q496
30 // AUGUST 2012 www.VoiceandData.com.au
IPv6
THE UPSIDE OF IPv4 EXHAUSTIONAlan Way, International Development Manager, Spirent Communications
In the build-up to IPv6 Day, and since, a lot has been written about the exhaustion of IPv4 ad-dresses. The pool of unallocated addresses has run out, and the Regional Internet Registries
(RIRs) will soon exhaust their local pools - Asia has already done so. For now, all new internet services will continue to require IPv4 addresses to access legacy addresses, but supplies will not last for long - despite temporary measures such as recovery of unused public addresses and the use of public Network Address Translation (NAT). By 2015, 17% of the internet is predicted to use IPv6, with 28% of new internet users running the protocol.
Even if a business is confident that, for the time being, IPV4 plus NAT will give it all the vis-ibility it needs, other factors could still force it to adopt IPv6 sooner than expected. For example: a growing number of national governments are applying mandates for IPv6 readiness. Also many new applications and services are being designed for a new generation of devices such as sensors, appliance-based controls, power management (smart grid), 4G wireless/LTE that are only just beginning to migrate to the internet and amounting to a surging demand for extra addresses - neces-sarily IPv6 because of the sheer numbers, predicted by companies such as IDC, Intel and Cisco to reach 15 billion intelligent, internet connected devices by 2015. Also, even if IPv6 devices can reach the company website via NAT, it could still miss key customer information based on web server logs which require native IPv6. With pressures such as these being touted, IPv6 migration can begin to feel
like yet another depressing burden on an already overstretched IT team. So let us, for a change, ‘accentuate the positive’ and ask if there might not be other benefits to look forward to, positive reasons to consider the move to IPv6? Yes, there are significant performance benefits of moving towards IPv6 that are often overlooked. It’s not just about addressing, it can actually put a little vroom into your network - a V6 under the bonnet really is preferable to a V4 if you are looking for added performance. In this case it can even be more efficient.
Checksums and efficiencyIPv6 is a much more structured, streamlined and efficient protocol than IPv4. IPv6 routers need not waste their precious resources calculating checksums on IP packets. Why bother, when the upper layer protocols already have protection in place? UDP, TCP and ICMPv6 all have checksums to protect the data and, along with the checksum at the MAC layer, do we really need another checksum? I don’t think so and neither did the designers of IPv6.
Fragmentation and packet lengthFragmentation is another task retired from router functionality. End points within the network have to maintain their packets within the MTU provided by the router - but with IPv6’s fixed length packets, these busy routers no longer have to reconstitute packet sizes to fit the pipes. Instead the routers can continue to focus on their primary task of directing packets to the correct destination.
With the pool of available IPv4 addresses about to run out, organisations are already under pressure to transition to IPv6. But this transition isn’t necessarily a burden: there are some positives to making the move, including increased network performance and efficiency.
©iS
tock
phot
o.co
m/p
icta
folio
IPv6
30 // AUGUST 2012 www.VoiceandData.com.au 31 // AUGUST 2012
Unlike IPv4’s varying packet lengths, IPv6 has a fixed packet length of 40 bytes. So the Header Length field for IPv4 is no longer present in IPv6, because we know it is going to be 40 bytes. This makes processing the packet much more efficient from the router’s perspective. There is still a field to describe the payload length, but this now also includes the packet options or extension headers. Again this helps improve the efficiency of the routers. With few exceptions, options are passed transparently through the router with no processing required.
So what are the exceptions that will have to be processed by the router? A few packets will have the hop by hop extension header in the very first position set to ‘0’ - indicating that the extensions following have to be processed by the router. This could, for example, indicate a router alert or jumbo gram - a very large packet anything up to 4 GB in length. But these options will only be handled on an exception basis, and that frees up a lot of resource within the router. Unlike IPv4 options, they do not have to be processed at every hop.
And don’t forget the flow labelThe flow label is a 20-bit field at the top of the IPv6 packet - seldom used to date, but bringing the promise of much improved quality of service. Unlike differentiated services, it could deliver a more assured quality of service, similar to RSVP. Differentiated services, such as assured forward-ing, rely on good human engineering at the initial network design because, for example, the QoS provisioning is largely static so, if the network is oversubscribed, certain applications such as VoIP could degrade voice quality across the entire network for all users. With the use of the flow label, however, we can implement a much more dynamic model that could more effectively mimic the PSTN. Rather than degrading the service for all users, we can provide a ‘busy’ signal when there is no longer sufficient resource within the network to guarantee a minimum QoS.
Generally the source will allocate a unique flow label for a given flow, maintaining the same destination address and source address for the life of the flow. A specific service level agreement (SLA) can be requested when the flow is initiated: if the network agrees to the requested SLA, such as throughput and latency, then this SLA will be maintained for the duration of the flow.
Experimental use of the flow labelOne experimental use of the flow label showed that a tremendous improvement in throughput could be achieved in high latency communications more prone to errors - such as satellite communica-tions. One enterprising user modified their TCP stack to bypass the TCP slow start rules - the
rationale for this was that, if the network has an agreed SLA due to the flow label negotiation, there would be little need to go through the TCP slow start process, or drop the throughput by 50% on account of occasional packet loss.
Although I was not able to get direct copies of the test results you can get a very good idea of the improvement from the diagram above show-ing results recorded by a Spirent Test Center comparing the performance of:
• On the left, stateless data (no TCP slow start or 50% drop in throughput due to packet loss).
• On the right, normal TCP traffic following the TCP slow Start rules.Notice how much more the TCP traffic is af-
fected due to a mere 3% packet loss. The results shown are mimicking a comparison of a modified TCP stack using the flow label with an unmodified TCP stack. This unmodified stack could also be operating with a flow label, while the modified TCP stack could still be used to recover lost packets and ensure the integrity of the traffic flow.
ConclusionSo here’s yet another reason to migrate to IPv6. It is not just a question of a need for IPv6 readi-ness to be visible to, and communicate with, a growing population of new IPv6 addresses out there - there are also significant performance benefits to be gained by running IPv6 on your internal network.
What can we look forward to in this respect? One customer I know that has made the full migration is already reporting a 300% overall improvement as a result of the sort of efficiencies described above. I look forward to seeing the results of further tests along these lines - what might IPv6 do for your company network?
Matrium Technologies Pty Ltd
Contact info and more items like this at wf.net.au/Q212
"There are significant performance benefits of moving towards IPv6 that are often overlooked. It’s not just about addressing, it can actually put a little vroom into your network."
32 // AUGUST 2012 www.VoiceandData.com.au
FIREWALL OPERATING SYSTEM
Fireware XTM 11.6 includes performance and management enhancements that help administrators define, review and enforce network policies.
The release is available for all WatchGuard XTM models and offers simple definition of user rules in Citrix and Terminal Services. It provides single sign-on so that users coming through Citrix XenApp or Microsoft Terminal Services envi-ronments don’t require any additional authentication steps.
The user authentication page has been updated to support smartphones (Android, iPhone, Windows Mobile), enabling mobile users to be identified for use in policy management and reporting.
Reputation Enabled Defense, the cloud-based URL reputation service that protects web users from malicious web pages, has been updated to include new phishing and malware information feeds from PhishTank and Mal-wareDomainList.
Firewall throughput has been increased on all XTM 5 and 8 Series models, by as much as 50% in some cases. Report Manager has been updated to include a dashboard and a single set of reports for both PCI and HIPAA. It now provides one-click access to information needed for compliance requirements.
The number of VLANs on XTM 3, 5 and 8 Series platforms has been increased. New diagnostic capabilities help users to troubleshoot VPN interoperability and connectivity issues.
New tools to help simplify the understanding and main-tenance of policies as defined on the firewall, including On-line Policy Checker, which helps to quickly simulate and understand how traffic is handled through the fire-wall. Users can enter IP address and port combinations to determine which firewall rule is triggered and whether traffic will be allowed.
WatchGuard Technologies Inc
Contact info and more items like this at wf.net.au/Q606
LOSS TESTING
Available to rent, the Kingfisher KI78010 singlemode APC light source and KI7600 power meter work together to test loss on singlemode optical fibre systems. Testing at 1310, 1550 and 1625 nm with a test tone feature provides continuity and fault finding functionality.
Good measurement accuracy is provided by the emitter offering a <0.1 dB reconnection repeatability. Autotest allows the power meter to automatically detect which wavelength is being tested.
Features include: good optical power stability; SC, FC and ST interchangeable connectors; long battery life; compact and lightweight for field use; flexible real-time PC reporting software.
TechRentals also offers a configuration and download service for this product.
TechRentals
Contact info and more items like this at wf.net.au/Q493
now available online!
NEW White Papers
For these and more White Paper downloads, visit www.VoiceandData.com.au/white_papers
BUILDING BLOCKS
Global networks for M2MM2M has a relatively short history, having been around since 2000
when it became apparent that communication between machines
carrying out similar functions would be a good idea. It has since
broadened into communication between dissimilar devices,
examples being medicine and mining. This eBook explains more
about this technology.
Business impact of application performance problemsIssues with the performance of business-critical applications can
cause deterioration of an organisation’s business performance. Slow
applications that support key business processes can cause revenue
loss and a decline in customer satisfaction and employee productivity.
To ensure you’re informed, be sure to read this white paper.
Building a storage environment for super-efficiencyThe growth of stored data is being driven by a need to leverage
new data sources (web-based social media, for example) to create
new business opportunities. The current ways of managing data in
this environment are not sustainable, however, so IT administrators
must therefore respond by becoming more efficient.
UC: mitigating the risk and reaping the rewardsUnified communications is an evolving set of technologies that
includes voice, video and mobility among others, and like anything
new it brings with it inherent rewards, requirements and risks.
This white paper gives an overview of UC deployment to help you
achieve the best results. Download now!
32 // AUGUST 2012 www.VoiceandData.com.au 33 // AUGUST 2012
POWER DISTRIBUTION
The Aten NRGence PDU series is a line of eco PDUs (power distribution units), eco sensors and energy boxes.
The devices provide real-time power management control and energy-saving ef-ficiency for IT managers by enabling them to upgrade current IT resources quickly and cost effectively. The use of dynamic Rack Cooling Index (RCI) and Return Tem-perature Index (RTI) by zone, as well as eco Sensor software in conjunction with sensor-enabled eco PDUs, gives IT managers the means to assess, diagnose and estimate how and where energy can be saved.
The PDUs offer remote power control combined with real-time power measure-ment, allowing IT managers to control and monitor the power status of devices attached to the PDUs - either at the PDU device or outlet level - from any location via a TCP/IP connection.
With a ‘Lock n Plug’ design, users can lock server plugs onto PDUs to secure power connection, preventing power plugs from dropping off.
Charts can display power usage trends in real time or according to day, month, season or year. Four models are available, varying by outlet type and the measure-ment of PDU or outlet power: PE6108, PE6208, PE8108 and PE8208.
Anyware Corporation
Contact info and more items like this at wf.net.au/Q611
Wireless Tech (Australia) Pty Ltd+61 2 8741 5080 | [email protected]
THINK IP SURVEILLANCE THINK D-LINK
completely integrated and proven
certified with leading video surveillance
software
single source of support
full line of latest IP cameras and switches
price performance leading IP storage
Key IP Camera Features*• Sony Exmor 1/2.8” 3 Megapixel CMOS progressive sensor
• Full HD resolution (1920x1080) up to 3M (2048x1536)
• H.264, MPEG-4, and MJPEG compression with multi-streaming
• DC iris varifocal 3.1 mm (W) to 8 mm (T) F1.2 CS mount lens
• Built-in removable IR-cut filter for day/night surveillance
• WDR to handle strong light sources
• SD Card slot for on board storage
• 2-way audio support
• Digital Input/Outputs for integration
with sensors and alarms
• Power over Ethernet (PoE) support
• 3GPP support for mobile monitoring
• Motion detection and email alerts
• Analogue BNC output
• ONVIF compliant
Key benefits of D-Link's end-to-end video surveillance solution include:
*DCS-3716
BUILDING BLOCKS
PROTOCOL TESTING FOR ETHERNET AND GIGABIT ETHERNET VALIDATION
The Investigator protocol testing solution for ethernet and gigabit ethernet validation encompasses the physical layer all the way through the upper layer protocol debug. It is a protocol analyser, traffic generation, impairment tester and BER tester.
The hardware captures every bit on the line to ensure complete verification and accurate report-ing. The software included with Investigator provides a full range of characterisation data, as well as advanced debug capabilities such as triggering and filtering.
Investigator for Ethernet en-compasses a full line-up of test components to thoroughly test an ethernet link.
TelecomTest Solutions
Contact info and more items like this at wf.net.au/Q200
34 // AUGUST 2012 www.VoiceandData.com.au
In my opinion
CONWAY’S LAW
"Were five specialists re spon s ib l e , ea ch designing one aspect or component of the system? Then you will likely find five subsystems or components each with a set of responsibilities and minimal dependence on the other components."
Justin Butcher, Analyst at IBRS, is an advisor specialising in enterprise architecture, solution architecture, business systems analysis and complex systems procurement. He is an experienced enterprise architect and technology architect with more than 10 years’ experience in federal government. Butcher provides insights into the practical application of enterprise architecture to address real issues that face modern enterprises. He focuses on the strategic alignment of technology to business goals and objectives, drawing on experience in software engineering, infrastructure solution design, data architecture and large project architecture leadership.
HOW YOUR SYSTEMS GOT IN A MESS
All too often, IT workers are handed a messy and mysterious IT system devised by someone else, a system with no rational structure, little documentation and no explanation of how it got so bad. Conway’s Law can help explain how the system got to that point and help to avoid making similar mistakes in the future.
CIOs, architects and managers responsible for IT systems often wonder - how did we end up with this mess? There’s no decent documentation. No one seems to
be responsible for the apparent lack of any rational architecture. A lot of stuff is “due to historical rea-sons”. Of course, this would never have happened under your watch, but now it’s your responsibil-ity to make some sense out of it. If your system represents a substantial investment, it stands to reason that you’ll want to understand why it was designed the way it is before you take any radical action to change it.
If you’ve ever been in this predicament, give a thought to Conway’s Law. Nine times out of ten it will give you some very useful clues. The law might sound abstract, but it’s actually quite simple and well worth understanding.
Melvin Conway said in 1968 that “organisations which design systems … are constrained to produce designs which are copies of the communication structures of these organisations”.
This ‘law’ has practically unlimited application. In terms of ‘enterprise systems’ (business, appli-cations, information or technology), here is how it can help:
Find out what the organisation structure of the design team was. Did separate teams or individuals design different components or facets?
What were the boundaries or bottlenecks in the communication processes involved in design?
The clues to the design rationale will often become clear at this point.
Were five specialists responsible, each designing one aspect or component of the system? Then you will likely find five subsystems or components each
with a set of responsibilities and minimal depend-ence on the other components. Each designer was responsible for making his or her own part of the system work.
It’s likely that no one consciously made a decision to break the design into five components, but that’s the result. It may be that the five people involved were the established experts or they may have been given management responsibility for discrete service delivery areas. Whatever the reason, it probably doesn’t make sense when the people have moved on or the organisation has restructured.
Apply Conway’s Law next time you get stuck with a problem like this. Understanding the ra-tionale for the system design will ensure that you don’t repeat the mistakes and means you have a whole new insight into how it can be improved, maintained and managed. It provides you with the ability to learn from the mistakes of others, which is always better than repeating them.
As Einstein said: “We can’t solve problems by using the same kind of thinking we used when we created them.”
Justin Butcher, Analyst, IBRS
©iS
tock
phot
o.co
m/D
NY5
9
34 // AUGUST 2012 PRIVACY INFORMATION: www.westwick-farrow.com.au/pages/privacy.asp
My main job function is(Select from List A)
My organisation's main industry sector is(Select from List B)
FREESUBSCRIPTION!
OPTIONSI would like to receive this magazine digital print both
I would also like the VoiceandData.com.au eNewsletter
V+D
Please complete this form in fulland fax to +61 2 9489 1265
Voice+Data is FREE to industry professionals in Australia and New Zealand.
To continue receiving your free copy you will be asked to register every three years.
www.VoiceandData.com.au/subscribe
Fax this completed page to +61 2 9489 1265
2 quick ways to register:
Name:
Job Title:
Organisation Name:
Address:
Postcode: Country:
Phone No: Mobile:
Fax No:
Email:
Signature:
Date:
List (A) Job Function
1 Management - Corporate/General2 Management - Manufacturing/ Engineering/Specialist3 Engineer - Electrical4 Engineer - Electronics5 Engineer - Process6 Engineer - Project7 Purchasing/Procurement8 Technician - Maintenance/Service9 Technician - IT10 Technical Officer11 Scientific Officer - R&D12 Scientific Officer - QA13 Consultant14 Contractor/Tradesperson15 OHS/EHS16 Education/Training17 Student-Undergraduate/Apprentice18 Analyst19 Sales/Marketing
List (B) Industry
1 Agriculture/Rural 2 Building/Construction 3 Chemicals/Allied Products 4 Communications Systems 5 Defence/Military 6 Education 7 Emergency Services/Law Enforcement/Security 8 Engineering Services 9 Environmental Services 10 Finance/Banking/Insurance/Legal 11 Food Industry - Bakery12 Food Industry - Beverages13 Food Industry - Confectionery14 Food Industry - Dairy15 Food Industry - Fruit & Vegetables16 Food Industry - Meat 17 Government - Federal18 Government - State19 Government - Local20 Health/Hospital 21 Instrumentalities (eg CSIRO) 22 IT - Networking23 IT - Security24 IT - Storage25 IT - Wireless26 Laboratory - Analytical27 Laboratory - Clinical/Medical28 Laboratory - Life Sciences29 Logistics/Transport/Warehouse 30 Manufacturing 31 Mining32 Oil/Gas/Coal33 Packaging34 Processing35 Retail/Wholesale/Hire36 Service/Maintenance37 Telecommunication38 Testing/Certification (eg NATA)39 Utilities
Wrapper number:(if known)