Connect with us

Features

A CONVERGED FUTURE

Published

on

Updated : April 5, 2015 00:31  am,
By Editor

img55Converged infrastructure promises to do away with many challenges of traditional datacenter architecture as it offers scalable integrated solutions

Converged infrastructure promises ease of deployment, central management, and optimization as it brings together storage, servers, networking, and management together. Leading vendors have been rolling out new converged infrastructure systems. Their objective is to offer a new way of integrated IT that radically redefines the way IT infrastructure is built and maintained and is geared to support cloud ready environments.

The value-propositions are quite appealing for both SMB and enterprise customers. It helps meet Technology expectations such as eliminate silos, simplify systems management, adopt efficiencies and effectiveness through virtualization, improve TCO alongside reduced footprints, improve automation as well as make the infrastructure far more agile.

Shams Hasan, Enterprise Product Manager, Middle East at Dell says, “Converged infrastructure is one of the fastest-growing segments of the IT industry.  Integrated infrastructure delivers ease of deployment, reduces capital equipment expenses, facilitates scalability and reduces management complexity.  Converged solutions are being widely adopted by large enterprises where infrastructure sprawl has chewed up budgets and made scalability a challenge, and as a method to speed delivery of IT services. They are also proving to be beneficial to IT-strapped small and mid-sized organizations, which often lack the skills and resources to keep up with increased business demands for IT services.”

According to Kartik Shankar, Senior Sales Manager, StorIT Distribution, as data centres and storage solutions continue to evolve, converged infrastructure is also taking the centre stage in modernization. Organizations that have invested in software-defined technologies for their data centre transformation are seeing value in converged infrastructure solutions.

He adds, “The trend towards converged infrastructure is primarily driven by TCO and performance objectives demands of emerging technology solutions. Sizing key components of the IT system infrastructure gets highly complex and challenging to meet the objective through the traditional way. Currently converged infrastructure is the most matured approach to address these challenges and backbone/infrastructure backbone of web 3.0.”

The traditional datacenters have seen the sprawl of technology silos of storage, networking, compute as separate racks. This is addressed through taking the convergence route to IT deployment.

Suda Srinivasan, Director for Product Marketing at Nutanix says, “Enterprise datacenters have become incredibly complex over the years. Every aspect of the legacy infrastructure lifecycle is a challenge, from buying and deploying to managing, scaling and support. At the heart of the problem is the traditional three-tier infrastructure model, with servers connected over a network to a shared scale-up storage solution. Converged infrastructure, or more specifically hyperconverged infrastructure, addresses this problem of complexity.”

There are two approaches to achieving the integrated systems infrastructure deployment. VCE, part of the EMC Federation champions the hardware-focused, building-block approach which is categorised as converged infrastructure whereas Nutanix, SimpliVity and recently VMware etc offer hyper-converged infrastructure, taking the software defined route. While converged systems are in general separate components that are designed to work well together, hyper-converged systems are modular. Hyperconverged solutions integrate compute and storage resources in a single x86-based server deployed in scale-out clusters.

Hyperconvergence in the ascent

Virtualization has pretty much become a standard for enterprise infrastructure except for a few legacy business critical applications. Converged or hyper-converged infrastructure can help realize greater benefits of virtualization.

Karthik says, “We can find enterprise setups managing both virtual and physical environment in many cases. This is majorly due to the limitations in the traditional infrastructure approach and support/compatibility challenges from the application vendor, etc. This is where converged infrastructure plays a major game changing role by providing custom engineered system components fine-tuned to run even legacy applications. This approach helps to balance and align the right system components to meet the business requirement, with improved performance and ease of infrastructure management.”

Hyperconverged infrastructure uses the webscale approach that is modular and scales up as required. This is well aligned with the needs of virtualization and cloud based infrastructure.

Shams says, “Once deployed, with web scale, the converged compute and local storage platform with distributed software technology can create extremely dynamic data centers that can easily be scaled.  This strategy and capability is crucial for the modern data center.”

According to Jan Ursi, Senior Director, Channel Sales & Marketing for EMEA and India at Nutanix, the traditional datacenter architecture with multiple components that need to be glued together manually is not built for virtualization or cloud. It is too complex, too rigid, scales in too large increments and slows down provisioning of new applications

He adds, “Virtualization is the default vehicle to Cloud, but the underlying IT infrastructure needs to change, learning from the most successful web companies like Google, Amazon, Azure, Facebook, etc. Simplifying the datacenter by virtualizing without a SAN, using a converged webscale virtual computing platform is critical for Virtualization and Cloud projects to live up to their promise.”

Nutanix, the leader in the hyperconverged space deploys more hyperconverged infrastructure than all other players in this space together with a 52% market share, according to IDC. The EMEA region represents around 25% of the global Nutanix footprint.

“Hundreds of datacenters rely on Nutanix to run their critical applications already for many years. The Nutanix projects are a mix of size and verticals, serving SMB enterprises like ADD in Belgium to large organizations like Orange Business Services. The uses vary from running critical tier-1 server workloads like Microsoft SQL, Oracle, SAP, and Microsoft Exchange to others like VDI, Big Data, Branch Office and Disaster Recovery projects,” says Jan Ursi, Sr. Director, Channel Sales & Marketing for EMEA and India at Nutanix.

Nutanix offers a software-defined solution that does not rely on any purpose built hardware. The Nutanix solution runs on a commodity server architecture on top of any industry standard hypervisor (VMware, Microsoft hyper-v or KVM).

However, customers can also choose between a wide portfolio of Nutanix nodes with a different mix of compute and storage resources on board. Next to the native Nutanix NX series appliances, customers can also opt to source the Dell XC series converged webscale appliances powered by the Nutanix software.

Some divergence with the convergence

There are two approaches for converged infrastructure. One where a single vendor owns all the technology, bundles it, tests it and then sells it as a single bundled solution to the customer. The second approach is when different vendors collaborate to bring the latest and best solutions based around a validated reference architecture that describe configurations of server/storage/networking products, which is integrated into one unified solution that is assembled, integrated and tested before selling it to the customer.

The converged infrastructure space is populated by many of the large sized vendors including some new start-ups. The vendors in the fray include EMC, NetApp, Cisco IBM, Hitachi, HP, Dell, Oracle etc. Reference architecture offerings include NetApp’s Flexpod and EMC’s VSPEX. Hitachi offers both pre-fabricated solutions and reference architectures under its Unified Compute Platform (UCP).

The flexpods

Flexpod is a reference architecture that uses technology from NetApp and Cisco Systems. The FlexPod solution portfolio combines NetApp storage systems, Cisco Unified Computing System servers, and Cisco Nexus fabric into a single, flexible architecture.

“The FlexPod, is a combination of networking servers from Cisco, NetApp storage with software from VMware for virtualization. The result is an integrated stack which solves the problems companies had in the past of buying and building their solutions and trying to make them work. The FlexPod is configured to work from the get go and is typically used by customers wishing to build a private cloud and then start to move towards a hybrid public,” says Graham Porter MENA Channel Manager.

The Flexpod converged portfolio has three offerings. Flexpod Datacentre is designed for large environments. FlexPod Express is targeted at small and medium-sized businesses. Finally, there is FlexPod Select, which is targeted at high performance workloads, including Hadoop big data analytics. According to NetApp, FlexPod has seen a sharp uptake in deployments and is an area of growth for the company moving forward.

Fadi Kanafani Regional Director, MENA and Pakistan at NetAPP says, We have 50 validated designs between us and Cisco for this integrated stack which makes it the number one converged cloud-based solution in the market now, a market that now exceeds 3B dollars globally. We have in excess of 4000 customers on the FlexPod which is showing over 80% growth from 2013 to 2014. ”

The VCE way

VCE, one of the key players in converged infrastructure, is a company founded by EMC, VMware and Cisco and now owned largely by EMC. The company has an appliance based approach and offers Vblocks that are prefabricated in their factories according to customer requirements.

Tom O’Reilly, CTO – Middle East & Africa at VCE says, “Vblock is a highly engineered single product. We have determined the best possible way to configure networking, storage, software, compute and virtualization altogether into one product. We manufacture our Vblocks in the factory, where we build not only the physical box, wherein we rack, stack, power and cable everything but we also logically configure the entire v-block for a customer’s datacenter. We also do logical configuration survey (LCS) at the customer site before that to understand the environment as to how they want use the Vblock. So when our v-blocks arrive at the site, they are ready to powered on, connected to the switches, to the networking and all ready to deploy mission critical applications.”

The company provides customers support through the full lifecycle. It provides a one window support for different elements of the vblock.

He adds further, “Each v-block is a single product to us and since we built it, we are best placed to provide the support. We do the support for the entire stack that includes networking, storage, compute, networking, virtualization etc.”

VCE also have a proprietary software called pro vision intelligent operations (Vision IO). This helps customers to manage the Vblocks as a single set of resources rather than have a tool to manage software, storage, networking etc separately. It gives them a view of the entire datacenter. In addition, VCE also has the Release Configuration Matrix (RCM) – essentially a firmware level for the v-block.

Tom says, “When we ship the vblocks from our factory, they are in a known good state; we know that they have been configured correctly and everything has been tested and validated. When a release is come from EMC, Cisco or VMware, customers may want to do updates for security or performance reasons whatever, we on a regular basis release a RCM – so that customer can have an entire firmware level update for the v-block instead of customers teasing and doing each update on their own. We do the testing and validation in our labs before we release the RCM so that spares the customer the hassle. This is true convergence as we approach it.”

The EMC Federation appears poised to take advantage of the growing demand for converged systems, especially in data centres. So the companies that are part of the Federation operate as separate entities while they have integrated product development.

Tom adds, “When we became part of EMC, anything that was part of converging technologies was put under the VCE umbrella. Today there is EMC VSPEX- which is reference architecture, EMC VSPEX blue- which is their hyper converged solution that they just announced and is built upon VMware’s EVO:RAIL,  and then there is the VCE Vblock. These solutions all provide some rapid ways of achieving some standard goals from customers and wrap the customer expectations around the solutions. The go to market strategy remain the same- VSPEX and VSPEX blue remain EMC products – it is just that their Marketing and Engineering will be under the VCE umbrella and report to the VCE Management. They go through the EMC channel. Our go to market stays the same with the VCE channel.”

VCE is now expanding its lineup of integrated infrastructure solutions with the VCE Foundation for Federation Enterprise Hybrid Cloud. This integrates VMware’s NSX network virtualization technology and vRealize management and orchestration software. In addition, the solution includes EMC’s ViPR software-defined storage (SDS) product.

Tom adds, “We are going to offer VCE foundation for enterprise hybrid cloud. Software defined storage, software defined networking and management orchestration tools will be pre-fabricated in a v-block from our factory. That will speed up the customer’s path to deploying enterprise hybrid cloud. That will be offered to the channel.”

The outlook

Adopting either of the key approaches, through convergence or hyperconvergence, the end goals are better alignment of the IT infrastructure in line with need to rapidly provision computing resources but only as required, to reduce footprint and eliminate sprawl, achieve pooling of resources in a seamless way and have the ability to scale. Vendors are betting on significant growth in terms of demand for such integrated systems.

MarketsandMarkets forecasts the converged infrastructure market to grow from $11.53 billion in 2014 to $ 33.89 billion in 2019 at a Compound Annual Growth Rate of 24.1%. MEA is also expected to experience significant growth during the forecast period. For the channel, those who have a strategic client base and have a great understanding of their client’s organization and their business needs, will hold the interest of value add distributor and vendors looking to take these solutions to market.

Continue Reading

Features

Paving the Way for AI Success in Business

Published

on

AI in business

By Karim Azar, Regional Vice President – Middle East & Turkey, Cloudera

The digital landscape is evolving at an unprecedented pace, and at the heart of this evolution lies the transformative potential of artificial intelligence (AI). Across industries, AI is not merely a buzzword but a revolutionary force driving innovation, efficiency, and growth. Its impact extends beyond automation, touching every side of business operations and decision-making. It can revolutionize multiple sectors and fundamentally reshape the corporate industry.

Nonetheless, challenges arise with technological evolution, particularly in accessing and overseeing varied datasets across diverse environments. These challenges frequently act as obstacles to achieving successful AI implementation. In response to these challenges, the technology landscape is witnessing significant advancements in open data lakehouse technologies, providing a robust foundation for AI and analytics. Let’s delve into key technological developments and their advantages, focusing on the broader implications rather than specific products.

Unlocking Business Potential

AI has the potential to unleash new opportunities for businesses. McKinsey’s findings reveal that more than 62% of companies in the Gulf Cooperation Council (GCC) region currently utilize Generative AI in some operational aspect. The research underscores the substantial potential of AI to create tangible value in the GCC, with an estimated value of up to $150 billion.

This adoption trend is not without merit; statistics show that 83% of businesses adopting AI report substantial (30%) or moderate (53%) benefits. AI can address various challenges by providing predictive analytics and personalized customer experiences, enabling organizations to make faster and more accurate data-driven decisions.

Despite the obstacles in adopting AI, such as data management complexities and security concerns, offering air-gapped deployment for large language models (LLMs) is still a viable option. This feature boosts security, data privacy, and performance while also lowering customer operational expenses. However, overcoming these challenges requires more than just technological solutions. It demands a comprehensive approach that includes robust data governance frameworks, continuous employee training programs, and collaboration with regulatory bodies to ensure compliance with data protection laws.

AI Across Industries

AI is not a one-size-fits-all solution. It is applied differently across industries and business functions, including healthcare, finance, manufacturing, and retail. The potential uses of AI are vast, from boosting supply chain efficiency to transforming healthcare outcomes and customer service.

For example, in the healthcare industry, AI-powered predictive analytics can help doctors identify patients at high risk of developing certain diseases, allowing for early intervention and personalized treatment plans. AI algorithms can analyze market trends and financial customer behavior to recommend customized investment strategies. In manufacturing, AI-driven predictive maintenance can proactively anticipate equipment failures and schedule maintenance activities, minimizing downtime and reducing costs.

As businesses increasingly adopt AI, they invest in their organization’s future. By promoting innovation and agility, companies can leverage AI to maintain competitiveness in a digital era. Prioritizing data privacy and security helps build trust with customers and stakeholders, ensuring AI technologies’ responsible and ethical use.

AI is a significant transformation in how businesses function and innovate. Embracing AI opens up vast opportunities for organizations to reshape their operations, stimulate growth, and influence the future of business. While the journey may present challenges, the potential benefits are boundless for those willing to embrace the power of AI.

Continue Reading

Features

Smart Cities and the Rise of Intelligent Transportation Systems: Exploring the Benefits and Risks of Vehicle Surveillance

Published

on

By: Dr Ryad Soobhany, Associate Professor, School of Mathematical & Computer Sciences, Heriot-Watt University Dubai

Intelligent Transportation Systems (ITS) have emerged as a transformative solution in urban areas, tackling challenges such as high traffic and pollution. These systems, incorporating a network of static and mobile sensors, including cameras on buildings or vehicles/drones, embedded in the smart city infrastructure, are revolutionizing traffic management. By harnessing data from cameras, in-vehicle GPS systems, in-vehicle Near Field Communication (NFC), IoT devices, and Artificial Intelligence (AI), ITS enable the monitoring and tracking of vehicles for Intelligent Traffic Management Systems (ITMS) or Public Transportation Management Systems (PTMS).

While intelligent transportation systems offer significant benefits, it’s crucial to acknowledge the challenges and risks they pose. ITMS provides real-time monitoring of traffic on roads and at junctions, while PTMS focus on managing transportation fleet and passenger information services. Emergency Response Management Systems (ERMS) primarily monitor the emergency responders of the smart city. The use of intelligent vehicle surveillance systems improves traffic management, public safety, and urban planning, but it also raises concerns about the data privacy and security of users and infrastructure, a risk that must be carefully managed.

Benefits

There are several benefits from the implementation of vehicle surveillance systems in urban areas and the most obvious one is a better vehicle traffic flow by using ITMS. Cameras placed strategically across the city monitor traffic to identify congested areas and road traffic incidents (e.g. accidents). Implementing dynamic traffic lights systems at junctions and temporary speed limits can improve traffic flow. Using AI, predictive traffic routing forecasts traffic bottlenecks and suggests alternative routing.  The use of PTMS leads to enhanced scheduling of public transportation; for example, the arrival/departure of trains/metro at the station is synchronized to feeder buses or taxis being stationed outside the station. There is an improvement in customer satisfaction and journey planning with real-time updates for public transport. Traffic flow is also improved by monitoring of cycle and pedestrian lanes, where safer cycle lanes will encourage road users to adopt cycling in certain urban areas adapted for cycling.

There is an overall improvement in public safety by better traffic management, with better response time to emergency situations by the ERMS, such as ambulances. LPR/ANPR (Licence Plate Recognition/Automatic Number Plate Recognition systems and GPS tracking systems in cars allow the monitoring of vehicles while they are located withing the bounds of the smart city. Stolen or wanted vehicles can be detected and followed through the city. The use of surveillance cameras, LPR/ANPR systems and GPS tracking can improve identification of criminal activities, which should enhance the response of law enforcement. Under-Vehicle Surveillance Systems (UVSS), which are cameras placed at strategic places on roads in the city take pictures or videos of the underside of vehicles to check the chassis for stolen cars. UVSS can also be used to detect contraband at ports or entry/exit points in smart cities.

The use of LPR/ANPR systems ease the management of Low Emission zones, which are areas where low emission vehicles (e.g. electric or hybrid vehicles) can circulate without charges and vehicles with higher emission rates have to pay an hourly or daily charge. The implementation of Low Emission zones can bring environmental benefits. The improved traffic flow in the urban areas can also lead to environmental benefits with less emissions in traffic jams and long traffic queues at junctions. Apart from environmental benefits, there are economic benefits linked to better health and overall happiness of citizens and visitors.

Risks

Several risks are associated with the amount of data collected from the vehicle surveillance systems. The main concern is the privacy of the smart city’s car drivers and car owners. Vehicles and their drivers are tracked everywhere they travel around the city and the speed they travel. This can lead to tracking drivers and without proper legal frameworks, the data collected can be used to encroach on the users’ privacy. The large amount of collected and stored data can be quite attractive to cyber criminals and might lead to cyber-attacks. Any data breach from these attacks might expose the personal information of drivers and their vehicles. Cyber-criminals can target the surveillance systems, for example hacking the intelligent dynamic traffic speed system and changing the traffic speed around the city.

Having video surveillance around the urban areas recording the public can lead to ethical issues. Most of the time, drivers might not have provided informed consent to participate in the vehicle surveillance systems. The lack of consent from users can lead to non-compliance with regulatory bodies and can result in legal challenges from user groups. Users need to be made aware that they are entering a vehicle surveillance zone and their data might be recorded. Vehicle surveillance systems can be used to discriminate against certain sections of the community, for example, young drivers might be unfairly targeted by the vehicle surveillance systems because they allegedly drive fast and dangerously, which allegedly cause accidents. Any cyber security attack or data intrusion can lead to users losing trust in the vehicle surveillance system.

The use of vehicle surveillance systems can benefit smart cities and enhance the quality of life of residents and visitors, but the authorities must respect the personal privacy of the public by ensuring that data are collected and processed ethically and guarded against any cyber-attack. Security policies and mitigation plans are primordial for vehicle surveillance systems.

Continue Reading

Features

Enabling MEA eGovernment Entities to Enhance Experiences while Cutting Costs

Published

on

WSO2

By Uday Shankar Kizhepat, Vice President and General Manager- Middle East and Africa Region, WSO2

We live digitally. Much of our professional work is digital, as is much of our leisure time. Our commercial activity – shopping, service subscription, banking, and more – is digital. And our government is digital. No doubt governance itself requires the wisdom of individuals. But the transactional part – filing, requesting, registering, licensing, and so on – is digital. Governments in the Middle East and Africa (MEA) know they have an opportunity, with today’s technologies, to streamline transactional government functions while cutting costs.

One way to do this is to introduce digital identities. By allowing each citizen to be recognized by their “bytes essence,” public authorities open the door to transformative programs that use these trusted online personas to get things done reliably and rapidly. Many regional nations are acknowledging the potential of digital ID systems and have cultivated track records for themselves in areas such as boosted citizen engagement and enhanced accuracy of outcomes.

Digital IDs offer a practical means to ensure useability when new e-government services come online. Identity verification, service accessibility, and data protection are three major, long-standing challenges encountered by regional governments on their digital transformation journeys. The digital ID solves all of them. It offers an elegant solution to the verification issue, obviously, but its simplicity enhances accessibility, and its security features protect data. 

The ’guarantee’

The digital identity may look straightforward, but its elegance is built on a toolbox of advanced technologies such as biometrics, encryption, and blockchain. These building blocks come together to give a guarantee of authenticity when an individual presents their credentials to an online gatekeeper. And we should not use the word “guarantee” lightly. It lies at the core of the viability of any authentication system offered by a government. When waved through the door, verified users can access tax history and health records. They can pay bills or register with a government agency. If verification is erroneous, a host of problems can arise.

The digital ID is a holistic, citizen-centric approach that strikes a balance between security and performance and yet does not compromise either. It eliminates bureaucratic bottlenecks and elevates the citizen experience without the public-sector agency ever relinquishing control of any part of the process. But how? How do digital IDs allow government services to operate at peak efficiency and grant seamless access to every citizen while not faltering when it comes to risk management? How do responsive, always-on services guarantee privacy and security? Well, the answer comes full circle, back to digital transformation. 

Governments in the Arab Gulf region mention digital transformation frequently in published guidelines that map the way to economic diversification. These same guidelines apply to the government itself, which must set about transforming systems, processes, and functions to prepare for digital IDs and the world they promise – one in which a digital service provider can offer both seamless access and security. Complexities come from the scale and interconnectedness of operations, and the need for every shred of data, every machine-to-machine process, and every user session to be secure. Regulatory obligations must be juggled with budgetary constraints while technology leaders play intermediary to vying stakeholder factions within the organisation. It is easy to see how challenging it might be to maintain interoperability and data-sharing in such a fraught environment.

Of course, none of this will deter government organisations in the MEA region. They know what the hurdles are, but they also know what is to be gained – smoother services that cost less to provide while engendering greater citizen trust and in fact are leading the way in some of these digital initiatives. Remember, regional governments also know that the expectations of their citizens have, in a very real sense, undergone a digital transformation of their own.

Success stories

If we cast our eyes around the region, we can see digital ID-centric transformation in action already. Some government organisations in the Middle East have introduced biometric facial recognition as part of digital identity phase-ins and are using the system for secure digital document storage. Also in current use are systems that allow single, mobile-based logins. In these countries, the government’s identity access management (IAM) system undergoes a sweeping overhaul that allows the unification of credentials data to provide secure digital identity.

In the Asian subcontinent, we find a government that directed its telecoms ministry to build a national information exchange layer using an API. Strict identity management was rolled out as part of this ambitious project. With digital identity in place, the government can enable slicker collaboration between its departments and enhanced efficiency in outputs. It can do all this while optimising data access and consumption, which empowers analysts to deliver more actionable insights to stakeholders across agencies and ministries.

In Africa, one country showed its peers how an integrated identity and access management solution can be used for risk-based authentication, single sign-on, multi factor authentication, and user self-service. The solution was designed to minimise the risk of identity theft, but it was also (through single sign-on) able to reduce complexity when onboarding and offboarding users.

Conflict resolved

If digital solutions are the future of government, then digital identity is the future of public-sector cybersecurity and risk management. Governments in the region have been trying for years now to transform service delivery and engender citizen trust and engagement, but security has always been in conflict with agility. Having leveraged digital identity, authorities rid themselves of the downsides and reap rewards such as those described here. These regional successes underscore not only the profound impact digital transformation can have on society, but the indispensable role digital identity will play in delivering those efficiencies in a way that promotes trust.

Continue Reading

Trending

Please enable JavaScript in your browser to complete this form.

Copyright © 2023 | The Integrator