A couple of weeks ago, I attended an event organised by the BCS South West (but forgot to post this write up!) – it was a presentation entitled “Towards Onlince Safety” given by Ken Corish, an Education Advisor. Although primarily intended for parents of school children, I felt it had a lot to offer those of us working in other areas such Commerce or Industry, and thought that many of the points made by Ken were highly relevant.
The presentation notes can be downloded from the BCS website: http://www.bcssouthwest.org.uk/server.asp?page=pastevents (Towards Online Safety). These give a really good overview of the current situation and how the issues are being tackled. However, watch out for a couple of the pages as they contain some really bad language – just bear in mind that the screenshots are of real pages created by children on social networking sites and you might be a bit surprised.
In addition there were a couple of short videos shown that were created by CEOP as part of the process of educating young people about the potential problems – these have been shown in many schoools and I would suggest that if you are a parent, you might want to see these for yourself. They can be downloaded from:
http://www.youtube.com/watch?v=-IOOn2wR8bU (Where’s Klaus?)
http://www.youtube.com/watch?v=vp5nScG6C5g (Think U Know: Girls)
http://www.youtube.com/watch?v=q4vyRBMjEv8&feature=related (Think U Know: Tom’s story)
http://www.youtube.com/watch?v=4w4_Hrwh2XI&feature=channel (Think before you post)
http://www.youtube.com/watch?v=CE2Ru-jqyrY&feature=related (Once posted, you lose it.)
Ken made the point that many adults don’t understand some of these issues, and so how can we expect children to. However, it’s also clear that many adults know little about online safelty or think that it is someone else’s responsibility. Whatever your view, it is important that the message does actually get around to everyone.
The Internet can be a great place – there is a lot of really good information available, you can achieve a lot and make great friends particularly if you are reasonably savvy. But it has its darker side and sadly, there are some really nasty people out there. However, that reflects real life and we should make sure that the more vulnerable people (and not just the youngsters) are properly educated to make sure that they stay safe.
Wednesday, 28 October 2009
I don’t know what I want – but I want it now!
Anyone that has had young children or has worked with them will know the feeling. Children can’t articulate what it is they want, and because the adults around them don’t understand them, they don’t get what it is they think they want (and often if they do get it, it turns out not to be what they really do want!).
Sadly this is often the case with many business people as well. They don’t understand the technical side of technology, and can’t use the right terminology to explain what they need (and often don’t actually know what it is they want). This can cause enormous frustrations on both sides – IT people are expected to be mind readers and business people are surprised that their simple requests seem to be so hard to fulfill.
We’ve had an example of this just recently – Sales wanted a report that would show some sales figures. However, they assumed that it was just a case of “output sales figures”. When it was then identified that there are a large number of fields in the database that hold different figures showing different things, they simply couldn’t understand this. As a result, the report produced is meaningless because it produces the wrong values for what they need. After several rewrites, it still doesn’t give what they want, and we appear to be nowhere near getting a satisfactory output.
Another issue has been some data that was used in a system that is not part of our remit to look after. That system has failed and they cannot get access. We’ve taken on the challenge of recovering the data, and we were getting phone calls every hour to ask how we were getting on. Fortunately, we have found a way, but it is irritating to have to keep explaining that the interruptions are delaying the process and as we are not psychic, we don’t know how long the process will take.
This is not a new problem, nor is it just confined to specific areas of the business. I’m sure that everyone has had to explain to senior managers that just because they have one copy of Office 97, they can’t install it on every single PC. Similarly, they are very keen to block access to web sites that they think are inappropriate for work, but it then turns out that they were the ones going to those sites!
Over the past few months, there has been a lot of discussion about future developments within IT; a lot of this focuses on the development of cloud computing. I’m not entirely convinced that it is the best way forward for everyone, although I can see some major advantages in certain circumstances. However, the problem is that some of those concerns are of a technical nature – the business people don’t understand the potential problems, and therefore can’t see the risks involved.
The problem is of course that many of the individuals concerned simply don’t want to learn the technical side of things – it then falls to the more technically minded to try to educate them in an appropriate way so that they can appreciate the problem. However, to do that, we have to be able to understand what they need so that we can provide the correct response, and in a way that they will appreciate the message. Basically, we need all IT staff to develop a certain level of business acumen (or to enhance their parenting skills!)
Sadly this is often the case with many business people as well. They don’t understand the technical side of technology, and can’t use the right terminology to explain what they need (and often don’t actually know what it is they want). This can cause enormous frustrations on both sides – IT people are expected to be mind readers and business people are surprised that their simple requests seem to be so hard to fulfill.
We’ve had an example of this just recently – Sales wanted a report that would show some sales figures. However, they assumed that it was just a case of “output sales figures”. When it was then identified that there are a large number of fields in the database that hold different figures showing different things, they simply couldn’t understand this. As a result, the report produced is meaningless because it produces the wrong values for what they need. After several rewrites, it still doesn’t give what they want, and we appear to be nowhere near getting a satisfactory output.
Another issue has been some data that was used in a system that is not part of our remit to look after. That system has failed and they cannot get access. We’ve taken on the challenge of recovering the data, and we were getting phone calls every hour to ask how we were getting on. Fortunately, we have found a way, but it is irritating to have to keep explaining that the interruptions are delaying the process and as we are not psychic, we don’t know how long the process will take.
This is not a new problem, nor is it just confined to specific areas of the business. I’m sure that everyone has had to explain to senior managers that just because they have one copy of Office 97, they can’t install it on every single PC. Similarly, they are very keen to block access to web sites that they think are inappropriate for work, but it then turns out that they were the ones going to those sites!
Over the past few months, there has been a lot of discussion about future developments within IT; a lot of this focuses on the development of cloud computing. I’m not entirely convinced that it is the best way forward for everyone, although I can see some major advantages in certain circumstances. However, the problem is that some of those concerns are of a technical nature – the business people don’t understand the potential problems, and therefore can’t see the risks involved.
The problem is of course that many of the individuals concerned simply don’t want to learn the technical side of things – it then falls to the more technically minded to try to educate them in an appropriate way so that they can appreciate the problem. However, to do that, we have to be able to understand what they need so that we can provide the correct response, and in a way that they will appreciate the message. Basically, we need all IT staff to develop a certain level of business acumen (or to enhance their parenting skills!)
Monday, 5 October 2009
The Sad, The Mad and The Bad.
A while ago, I was asked to take part in the Microsoft Technet Community Council. We had a meeting a few weeks ago and it was really positive – from comments made on the day, I think that Microsoft are serious about listening to people and taking their views on board.
Whilst I was at the meeting, I met several of the Technet staff, including James O’Neill – I’ve followed some of the stuff that he has done in the past, and it was really good to see the person behind the writing, so to speak. He’s really driven by his passion for technology and has written eloquently on several topics which I have found of real value. Catch it here at: http://blogs.technet.com/jamesone/
So I was saddened to read his latest piece - it turns out that he has been the victim of a theft, and has lost many treasured items that were in his laptop bag. No top of the range gizmos, but none the less, things that mean a lot to him. His blog shows the anger and frustration he feels – it’s a terrible thing to become a victim and although several other people have offered their condolences, I know that he will still feel the pain of the loss.
Many people have their lives in the mobiles or on their laptops – contact details, names, addresses, numbers. Many others keep other ID details and some even keep credit card or other bank information in their devices. Losing the device is bad enough, but then these people are unable to run their normal lives until they can replace the missing information. And if that information falls into the hands of bad guys, then they really have major problems.
People are generally trusting; we assume that other people will behave in a way that is similar to the way that we ourselves would behave. It’s a terrible blow when we realise that some people are not as trustworthy as we would like. It’s even worse when the people concerned are people that we know or trust. In this case, it was a public event organised by Microsoft for technology specialists - in other words, probably one of our own.
For many years, I worked as a manager for a number of the bigger UK retailers, some of whom are still around, a couple long gone. At the start of my training, I attended a security session – the trainer was the company CSO, a former senior officer with the Metropolitan Police. His first words to our groups of trainees were, “There are only 3 types of people in the world; the Sad, the Mad and the Bad. Everyone falls into one of these 3 categories – and that includes all of you”.
His cynicism was the result of many years dealing with the public – no doubt, he had heard every excuse, every sob story, met people that had suffered the slings and arrows of outrageous fortune and met many, many people that were just no damn good. But everyone? And he then made the statement that we lost more through staff theft, than through pilfering by customers. I argued with him, but to no avail; and his response was that one day I would understand. And I hate to admit it it, but yes he was 100% correct.
Whilst I was at the meeting, I met several of the Technet staff, including James O’Neill – I’ve followed some of the stuff that he has done in the past, and it was really good to see the person behind the writing, so to speak. He’s really driven by his passion for technology and has written eloquently on several topics which I have found of real value. Catch it here at: http://blogs.technet.com/jamesone/
So I was saddened to read his latest piece - it turns out that he has been the victim of a theft, and has lost many treasured items that were in his laptop bag. No top of the range gizmos, but none the less, things that mean a lot to him. His blog shows the anger and frustration he feels – it’s a terrible thing to become a victim and although several other people have offered their condolences, I know that he will still feel the pain of the loss.
Many people have their lives in the mobiles or on their laptops – contact details, names, addresses, numbers. Many others keep other ID details and some even keep credit card or other bank information in their devices. Losing the device is bad enough, but then these people are unable to run their normal lives until they can replace the missing information. And if that information falls into the hands of bad guys, then they really have major problems.
People are generally trusting; we assume that other people will behave in a way that is similar to the way that we ourselves would behave. It’s a terrible blow when we realise that some people are not as trustworthy as we would like. It’s even worse when the people concerned are people that we know or trust. In this case, it was a public event organised by Microsoft for technology specialists - in other words, probably one of our own.
For many years, I worked as a manager for a number of the bigger UK retailers, some of whom are still around, a couple long gone. At the start of my training, I attended a security session – the trainer was the company CSO, a former senior officer with the Metropolitan Police. His first words to our groups of trainees were, “There are only 3 types of people in the world; the Sad, the Mad and the Bad. Everyone falls into one of these 3 categories – and that includes all of you”.
His cynicism was the result of many years dealing with the public – no doubt, he had heard every excuse, every sob story, met people that had suffered the slings and arrows of outrageous fortune and met many, many people that were just no damn good. But everyone? And he then made the statement that we lost more through staff theft, than through pilfering by customers. I argued with him, but to no avail; and his response was that one day I would understand. And I hate to admit it it, but yes he was 100% correct.
Monday, 21 September 2009
Sniff, sniff.
I woke up yesterday feeling a bit ragged around the edges – sneezing / sniffing, coughing, eyes watering. No it’s not flu (not even Man flu) just a bit of a later summer cold. No aches, pains, shivering etc.
However, it did make me think again about our Business Continuity planning. I did some work on this a couple of years ago and we actually have a basic outline plan of what to do. I went through it earlier in the year with the HR manager as they were concerned about the possibilty of the swine flu epidemic causing us some issues.
Although nothing much happened at the time, going on past experience of influenza pandemics, there will be another bout of it over the winter months, and possibly a third wave later next year. Although it seems that swine flu is not as virulent as other strains, it could still cause some staff to take time off work.
As we are a manufacturer, production is likely to be affected by a reduction in staff available. They do have the capacity to run some light shifts, but it may be necessary to move production between the different sites. Fortunately possible as we have standardised methods – we don’t yet have a single system to control this, but that is a longer term project that is underway.
For office staff, we currently have a number of key people that work with laptops; these people have a remote access facilty that allows them to connect to internal systems and continue working. We are currently looking to replace a number of those laptops and the older ones will be kept back, cleaned down and issued for use in an emergency situation.
We also installed a new telephone systems a while back – we still have some more modules that could be added to this, but we hope the new system will aslo improve the way that staff can communicate with customers and suppliers in the event of some issues.
But one item that I did discuss with management hasn’t been fully implemented yet – a scheme to encourage better hygienic practices. Anyone that has worked in food production or in the health service will know that considerable resources go to training people to take more care over preventing passing on germs. I worked with some people in a lab for a while and the level of bacterial infection found in some of the swab tests could really put you off your lunch! And I’m sure everyone has stories of what they have found under the keys of a keyboard!
It’s strange how people that are so careful to wash their hands after relieving them selves, don’t bother to give their work surface even the most cursory of cleaning. And how many telephone handsets get a wipe with a cloth that looks dirtier than the surface it’s being used to clean? Perhaps we need to have a new certification – the correct sanitisation and cleaning of Personal Computers!
However, it did make me think again about our Business Continuity planning. I did some work on this a couple of years ago and we actually have a basic outline plan of what to do. I went through it earlier in the year with the HR manager as they were concerned about the possibilty of the swine flu epidemic causing us some issues.
Although nothing much happened at the time, going on past experience of influenza pandemics, there will be another bout of it over the winter months, and possibly a third wave later next year. Although it seems that swine flu is not as virulent as other strains, it could still cause some staff to take time off work.
As we are a manufacturer, production is likely to be affected by a reduction in staff available. They do have the capacity to run some light shifts, but it may be necessary to move production between the different sites. Fortunately possible as we have standardised methods – we don’t yet have a single system to control this, but that is a longer term project that is underway.
For office staff, we currently have a number of key people that work with laptops; these people have a remote access facilty that allows them to connect to internal systems and continue working. We are currently looking to replace a number of those laptops and the older ones will be kept back, cleaned down and issued for use in an emergency situation.
We also installed a new telephone systems a while back – we still have some more modules that could be added to this, but we hope the new system will aslo improve the way that staff can communicate with customers and suppliers in the event of some issues.
But one item that I did discuss with management hasn’t been fully implemented yet – a scheme to encourage better hygienic practices. Anyone that has worked in food production or in the health service will know that considerable resources go to training people to take more care over preventing passing on germs. I worked with some people in a lab for a while and the level of bacterial infection found in some of the swab tests could really put you off your lunch! And I’m sure everyone has stories of what they have found under the keys of a keyboard!
It’s strange how people that are so careful to wash their hands after relieving them selves, don’t bother to give their work surface even the most cursory of cleaning. And how many telephone handsets get a wipe with a cloth that looks dirtier than the surface it’s being used to clean? Perhaps we need to have a new certification – the correct sanitisation and cleaning of Personal Computers!
Friday, 11 September 2009
Suffering with Delusions of Adequacy
Some years ago, I came across the phrase “Suffering with delusions of adequacy”. It was used in a contemptuous way to describe the attitude of some people working on a major project – the people concerned hadn’t bothered to check their work as they knew that what they had done was totally perfect because they had done it. In fact their work was severely flawed and as a result, the project delayed whilst the problems were fixed.
It’s possible to see this attitude on many different user forums. Someone will pose a question, and another person will then post a response belittling the first person for their lack of skill. However, the individual leaping to criticise the other may not have taken all of the factors into consideration and as a result, the comments may be completely inappropriate.
I had a situation like this some years ago – a frantic sysadmin posted a comment on a forum about a problem with an ERP package that wouldn’t startup. One of the forum moderators responded with a confident assertion that the person had a virus and would have to completely re-install the OS and ERP package. I posted a comment that I had the same problem myself just 2 days before, and that it was solved by one of the run time elements being restarted – perhaps they should look at this first. When this was suggested, the moderator posted a major rant that newcomers should keep quiet!
In another incident several years before, I worked with a programmer on a large software package. I was running some tests using a manual script to check the functions of the software after a number of changes. I came across an unusual error which I reported to him – his response was that the software worked fine and it must be an error in the data that I was entering. I sent him copies of the data, screen shots of the process, yet he still refused to acknowledge there was a problem.
This went on for 3 weeks – eventually I spoke to another programmer who checked the code and found the error. It subsequently turned out the the first programmer hadn’t even bothered to run the checks – if he had, he would have seen the problem for himself as every other programmer did when I checked with them. This was extremely annoying as the wasted time could have been saved for more important issues and the faulty code had been issued to customers and had to be replaced.
Of course this is not specific to programmers (although they can be bad!) I’ve had discussions with networking technicians that refuse to accept that they could have made a mistake in setting up a routing table, and DB admins that can’t accept that their precious database is flawed. And don’t even get me started on consultants! As for the linux lovers and mac fanboys with their “my OS is better than yours”, they can be a real pain at times.
It seems that there are a lot of people in the IT world that suffer with delusions of adequacy. I’ve long felt that we need to try to improve the professionalism of the people that work in the industry, and this is one particular area that needs looking at. It seems to me that there are just far too many people that think they know the answer to every single problem, but need a large serving of humility. Whilst people act as if they are the fount of all knowledge when they clearly are not, it will be difficult to persuade others that people working in IT really are professionals.
It’s possible to see this attitude on many different user forums. Someone will pose a question, and another person will then post a response belittling the first person for their lack of skill. However, the individual leaping to criticise the other may not have taken all of the factors into consideration and as a result, the comments may be completely inappropriate.
I had a situation like this some years ago – a frantic sysadmin posted a comment on a forum about a problem with an ERP package that wouldn’t startup. One of the forum moderators responded with a confident assertion that the person had a virus and would have to completely re-install the OS and ERP package. I posted a comment that I had the same problem myself just 2 days before, and that it was solved by one of the run time elements being restarted – perhaps they should look at this first. When this was suggested, the moderator posted a major rant that newcomers should keep quiet!
In another incident several years before, I worked with a programmer on a large software package. I was running some tests using a manual script to check the functions of the software after a number of changes. I came across an unusual error which I reported to him – his response was that the software worked fine and it must be an error in the data that I was entering. I sent him copies of the data, screen shots of the process, yet he still refused to acknowledge there was a problem.
This went on for 3 weeks – eventually I spoke to another programmer who checked the code and found the error. It subsequently turned out the the first programmer hadn’t even bothered to run the checks – if he had, he would have seen the problem for himself as every other programmer did when I checked with them. This was extremely annoying as the wasted time could have been saved for more important issues and the faulty code had been issued to customers and had to be replaced.
Of course this is not specific to programmers (although they can be bad!) I’ve had discussions with networking technicians that refuse to accept that they could have made a mistake in setting up a routing table, and DB admins that can’t accept that their precious database is flawed. And don’t even get me started on consultants! As for the linux lovers and mac fanboys with their “my OS is better than yours”, they can be a real pain at times.
It seems that there are a lot of people in the IT world that suffer with delusions of adequacy. I’ve long felt that we need to try to improve the professionalism of the people that work in the industry, and this is one particular area that needs looking at. It seems to me that there are just far too many people that think they know the answer to every single problem, but need a large serving of humility. Whilst people act as if they are the fount of all knowledge when they clearly are not, it will be difficult to persuade others that people working in IT really are professionals.
Monday, 24 August 2009
(Un)Social Networking
People are social animals for the most part. We love to communicate with one another, share information about what we and people we know are up to – and it’s been suggested that this is why human beings developed the capacity for speech. In years gone by, people wrote letters to one another, or if urgent would send telegrams. Later, the telephone allowed actual real time conversations between people and that has lead to the growth of the more modern methods.
With the growth of the Internet, different methods of communicating have been developed and are used by people to enhance the way that they converse. And this has created a major problem; many workers want access to these new methods of communicating – instant messaging, blogs, wikis, social networking, video streaming and photo sharing sites. This increases the amount of data being transmitted and stored, which also increases the pressure on resources, and adds to the possibility of security issues.
Now many will maintain that these new methods provide significant benefits to the modern organisation – arguments are put forward such as “providing new revenue streams”, “improving marketing opportunities”, “ensuring real-time communications” – all the usual buzz words that you get from the people trying to persuade you that this is the way forward.
I like to think that I am quite open minded about most technologies, and I can see that there is a lot to be gained on a personal level from the use of these products. I can even see a number of practical applications within a business environment and have planned some projects to explore some of these. However, I do have a number of concerns relating to the security of these systems and how much time people will spend on them.
For example, being cynical I know that most data losses are caused by internal staff, not by outsiders hacking into the systems. Most companies are extremely protective of their data; but the social networking facilities can make it very easy for this to be copied and moved.
There is also the possibility that these systems could provide a route in for malware to be loaded. A user wants to install a new “Tool bar” application they see advertised on an IM message and click to install, not realising that what they are really doing is installed a keystroke logger.
Of course, there is also the concern that the staff may spend more of their working day actually chatting or posting items online rather than doing the job that they are supposed to be doing (I’m doing this in my lunch break!). And we have all heard the stories of embarassment of people posting comments in emails or on Facebook that are then sent around the world. These can cause an organisation to lose business and come to haunt a company for many years after the original event.
I think that there is a place in work for some of these tools – if we can teach people how to use them properly. But we have to make sure that they are being used appropriately and that we have a set policy so that all staff know where they stand, and we have to make sure that we can enforce these. I doubt that we can completely block their use, but I think it appropriate to try to set some ground rules so that we can at least try to make sure that they are not being used inappropriately.
What do you think?
With the growth of the Internet, different methods of communicating have been developed and are used by people to enhance the way that they converse. And this has created a major problem; many workers want access to these new methods of communicating – instant messaging, blogs, wikis, social networking, video streaming and photo sharing sites. This increases the amount of data being transmitted and stored, which also increases the pressure on resources, and adds to the possibility of security issues.
Now many will maintain that these new methods provide significant benefits to the modern organisation – arguments are put forward such as “providing new revenue streams”, “improving marketing opportunities”, “ensuring real-time communications” – all the usual buzz words that you get from the people trying to persuade you that this is the way forward.
I like to think that I am quite open minded about most technologies, and I can see that there is a lot to be gained on a personal level from the use of these products. I can even see a number of practical applications within a business environment and have planned some projects to explore some of these. However, I do have a number of concerns relating to the security of these systems and how much time people will spend on them.
For example, being cynical I know that most data losses are caused by internal staff, not by outsiders hacking into the systems. Most companies are extremely protective of their data; but the social networking facilities can make it very easy for this to be copied and moved.
There is also the possibility that these systems could provide a route in for malware to be loaded. A user wants to install a new “Tool bar” application they see advertised on an IM message and click to install, not realising that what they are really doing is installed a keystroke logger.
Of course, there is also the concern that the staff may spend more of their working day actually chatting or posting items online rather than doing the job that they are supposed to be doing (I’m doing this in my lunch break!). And we have all heard the stories of embarassment of people posting comments in emails or on Facebook that are then sent around the world. These can cause an organisation to lose business and come to haunt a company for many years after the original event.
I think that there is a place in work for some of these tools – if we can teach people how to use them properly. But we have to make sure that they are being used appropriately and that we have a set policy so that all staff know where they stand, and we have to make sure that we can enforce these. I doubt that we can completely block their use, but I think it appropriate to try to set some ground rules so that we can at least try to make sure that they are not being used inappropriately.
What do you think?
Tuesday, 11 August 2009
The battle of the Vs – VMWare vs Hyper V
Last week, I and one of the guys in the department had the chance to attend an event that demoed VMWare 4 and Windows Server 2008 R2 with Hyper-V. Many thanks to the people at Nexus in Exeter (http://www.nexusopensystems.co.uk/) that hosted the event, especially Gary that did the demos.
The presentations were quite straight forward. The first session was VMWare and we were shown the installation process starting right from the bare metal server. The actual installation process was Linux based and took about 20 minutes on releatively low spec machines. Once it was all up and running, we had the chance to see some virtual servers being created – literally just a matter of a few minutes work. We also discussed the switching process and the various options, and briefly saw how to create virtual switches.
There was a bit of a discussion about the merits of the VMWare product – how it allows you to “overload” by selecting options for the virtual servers such as levels of RAM that total up to more than the physical amount actually available. I would want to check this out for myself, but it certainly seemed to run OK.
We then discussed clustering and resiliance and the demo that followed showed a high definition media file being moved from one virtual server to another – the file ran constantly during the move and there was not even a slight pause during the process. Really impressive! Certainly, this would be of significant value in a situation where you are having to move production data when people are still working on it.
The demo actually ran over a bit as we were really interested in the product and had several questions to ask about various aspects – and Gary was only too pleased to show us the various bits in response. There is no question that it is an awesome product.
We then had the chance to see Hyper-V in action and for me it was the first chance I’ve had to look at this. We have Windows Server 2008, but not the R2 version which contains the hypervisor. The main difference between the two is that the VMWare hypervisor sits above the hardware and handles all of the driver requirements. Hyper V sits at the same level as the OS, just above the hardware, but each virtual server will handle it’s own drivers seperately. It also doesn’t allow overloading of resources – once you hit the limit, that’s it.
From what we saw, the Hyper V runs well – certainly it provided a smooth experience whilst we were watching it and the test moving the media file ran pretty much the same. There were a few diffences in the way that the virtual networking operates, but certainly it seems to run as we had expected. It definitely doesn’t have all the functionality of VMWare, but then there is a price difference – it’s a lot cheaper.
I’ve been looking at this now for a few months (in between other jobs) and I’m convinced that virtualisation is the way to go. It will certainly cut costs in terms of the electric bill, and it will also fit very nicely into our backup process / business continuity / disaster recovery planning. About half of our servers will reach 5 years old next year, so it seems a good time to start planning a move over to a virtualised system.
We have had a couple of visits to different vendor demos and they have been really useful. Although nothing has been decided, we are leaning towards the Dell Equalogic equipment – it seems to be everything that we could want and a bit more. The big issue of course is what software to run on the servers which is why we wanted to get to the event in Exeter. Howevever, I still not sure which one I think is the best option for us.
I’ve therefore planned that in the new year, say Jan / Feb 2010, we will get ourselves a spare server – there are plenty of cheap machines around at the moment. There is a trial version of VMWare available and of course, the Technet subscription allows us to install an evaluation copy of Server 2008 R2. Hopefully, this will gives us the chance to actually work with both products so that we can get a really good idea of which one we prefer – all we then have to do then is sell it to the powers that be!
The presentations were quite straight forward. The first session was VMWare and we were shown the installation process starting right from the bare metal server. The actual installation process was Linux based and took about 20 minutes on releatively low spec machines. Once it was all up and running, we had the chance to see some virtual servers being created – literally just a matter of a few minutes work. We also discussed the switching process and the various options, and briefly saw how to create virtual switches.
There was a bit of a discussion about the merits of the VMWare product – how it allows you to “overload” by selecting options for the virtual servers such as levels of RAM that total up to more than the physical amount actually available. I would want to check this out for myself, but it certainly seemed to run OK.
We then discussed clustering and resiliance and the demo that followed showed a high definition media file being moved from one virtual server to another – the file ran constantly during the move and there was not even a slight pause during the process. Really impressive! Certainly, this would be of significant value in a situation where you are having to move production data when people are still working on it.
The demo actually ran over a bit as we were really interested in the product and had several questions to ask about various aspects – and Gary was only too pleased to show us the various bits in response. There is no question that it is an awesome product.
We then had the chance to see Hyper-V in action and for me it was the first chance I’ve had to look at this. We have Windows Server 2008, but not the R2 version which contains the hypervisor. The main difference between the two is that the VMWare hypervisor sits above the hardware and handles all of the driver requirements. Hyper V sits at the same level as the OS, just above the hardware, but each virtual server will handle it’s own drivers seperately. It also doesn’t allow overloading of resources – once you hit the limit, that’s it.
From what we saw, the Hyper V runs well – certainly it provided a smooth experience whilst we were watching it and the test moving the media file ran pretty much the same. There were a few diffences in the way that the virtual networking operates, but certainly it seems to run as we had expected. It definitely doesn’t have all the functionality of VMWare, but then there is a price difference – it’s a lot cheaper.
I’ve been looking at this now for a few months (in between other jobs) and I’m convinced that virtualisation is the way to go. It will certainly cut costs in terms of the electric bill, and it will also fit very nicely into our backup process / business continuity / disaster recovery planning. About half of our servers will reach 5 years old next year, so it seems a good time to start planning a move over to a virtualised system.
We have had a couple of visits to different vendor demos and they have been really useful. Although nothing has been decided, we are leaning towards the Dell Equalogic equipment – it seems to be everything that we could want and a bit more. The big issue of course is what software to run on the servers which is why we wanted to get to the event in Exeter. Howevever, I still not sure which one I think is the best option for us.
I’ve therefore planned that in the new year, say Jan / Feb 2010, we will get ourselves a spare server – there are plenty of cheap machines around at the moment. There is a trial version of VMWare available and of course, the Technet subscription allows us to install an evaluation copy of Server 2008 R2. Hopefully, this will gives us the chance to actually work with both products so that we can get a really good idea of which one we prefer – all we then have to do then is sell it to the powers that be!
Subscribe to:
Posts (Atom)