Q. What is data center tiers? What is tier 1 data center? Which tier / level is the best for maximum uptime?
A. Tier 1 to 4 data center is nothing but a standardized methodology used to define uptime of data center. This is useful for measuring:
a) Data center performance
c) ROI (return on investment)
Tier 4 data center considered as most robust and less prone to failures. Tier 4 is designed to host mission critical servers and computer systems, with fully redundant subsystems (cooling, power, network links, storage etc) and compartmentalized security zones controlled by biometric access controls methods. Naturally, the simplest is a Tier 1 data center used by small business or shops.
- Tier 1 = Non-redundant capacity components (single uplink and servers).
- Tier 2 = Tier 1 + Redundant capacity components.
- Tier 3 = Tier 1 + Tier 2 + Dual-powered equipments and multiple uplinks.
- Tier 4 = Tier 1 + Tier 2 + Tier 3 + all components are fully fault-tolerant including uplinks, storage, chillers, HVAC systems, servers etc. Everything is dual-powered.
Data Center Availability According To Tiers
The levels also describes the availability of data from the hardware at a location as follows:
- Tier 1: Guaranteeing 99.671% availability.
- Tier 2: Guaranteeing 99.741% availability.
- Tier 3: Guaranteeing 99.982% availability.
- Tier 4: Guaranteeing 99.995% availability.
|Introducing the 1st Public Cloud in the Middle East|
|Looking for scalable computing and on-demand IT infrastructure, while minimizing capital expenses?
Public cloud is the right solution for you!
Provision your public cloud servers in minutes with eHDF’s Public Cloud hosting services
Starts from $31 Per Month*
Sent from my iPadmc
Apple is making a push for the corporate IT market through a partnership with IBM, which will develop iOS apps for its Big Data and analytics services and promote iPhones and iPads to clients.
The deal will see IBM, one of the industry’s largest providers of corporate IT, develop more than 100 apps and services exclusively for Apple’s iOS, the companies said in a statement Tuesday.
It will also tailor its cloud services for iOS and provide iOS device activation, supply and management to its customers, including the ability to lease rather than buy Apple hardware.
Apple, meanwhile, will offer new AppleCare warranty services for enterprise customers that include 24-hour assistance and on-site support.
Apple CEO Tim Cook said in a statement that the partnership opens “a large market opportunity for Apple.”
“This is a radical step for enterprise and something that only Apple and IBM can deliver,” he said.
The first IBM apps to stem from the collaboration could be out by autumn, the companies said – which is when Apple’s iOS 8 platform is expected to launch.
Initial apps will be targeted at the retail, health care, banking, travel, transportation, telecommunications and insurance industries.
The deal with IBM could provide a significant boost for Apple in the corporate sector, potentially leading to increased wide-scale deployment of its products among workers.
IBM claims three-quarters of Fortune 100 companies use its enterprise software, and it says it has enjoyed top market share for five straight years in IDC’s ranking of the world’s biggest enterprise social software makers.
Big Switch Networks this week is unveiling an SDN controller designed to bring Google-like hyperscale networking to enterprises.
The software, called Cloud Fabric, runs on bare metal switches and allows users to build cloud “pods” where racks of servers, switches and applications can be grouped logically to serve a specific function, such as an OpenStack private cloud (http://www.networkworld.com/article/2172063/cloud-computing/gartner-analyst-slams-openstack–again.html), Hadoop big data cluster, or a virtual desktop infrastructure.
This is in contrast to operating, provisioning and monitoring each individual business application, such as SAP or Oracle or Microsoft Office, as its own silo.
Cloud Fabric works with Big Switch’s SwitchLight operating system on spine switches, and SwitchLight OS on leafs. Optional components are an OpenStack plugin and SwitchLight virtual switches on leafs.
SwitchLight speaks OpenFlow 1.3 to the Cloud Fabric controller. The controller also supports high availability and zero touch provisioning features, Big Switch says. It supports Microsoft HyperV, KVM, VMware and Open vSwitch-enabled hypervisors.
Big Switch believes next-generation data center switching – white box hardware and software, fabrics, virtual switching and overlays – will gradually supplant traditional top-of-rack and aggregation switching in the data center. Though it represented less than $1 billion of the total $8 billion-plus data center switching market in 2013, next-generation data center switching will be about a $6 billion piece of the overall $13 billion market by 2019, the company predicts.
“There’s a big shift going on in the market,” says Big Switch CEO Doug Murray. “We’re at an inflection point where the market is going to shift over the next three years.”
Cloud Fabric, which is in 10 beta sites, will ship this quarter.
Big Switch hopes Cloud Fabric enjoys the same momentum as its Big Tap monitoring application. Bookings for that product doubled in the second quarter compared to the first, with wins in financial, federal government, public sector service provider and high tech verticals in three continents, says Murray.
Big Tap 4.0, the company’s newest release, has added support for Accton and Dell hardware, and now allows users to share tools between data centers, Murray says.
Big Switch also landed its first million dollar customer in the first quarter, Murray says, with a deployment across 16 data centers. And all this progress before its resale partnership with Dell commences in the second half of the year.
And the company has expanded and added new partners, some of them replacing ones who have departed, Murray says. Among the new partners are HortonWorks for enterprise-grade Hadoop deployments; FireEye for VM-based security; Accto; Telchemy for video analytics; and iwNetworks for bare metal Ethernet switches.
XML SOAP is a language that allows a program running in one operating system to communicate with another program in another operating system over the internet.
A group of vendors from Microsoft, IBM, Lotus and others, created an XML-based protocol that lets you activate applications or objects within an application across the Internet. SOAP codifies the practice of using XML and HTTP to invoke methods across networks and computer platforms.
With distributed computing and web applications, a request for an application comes from one computer (the “client”) and is transmitted over the Internet to another computer (the “server”). There are many ways of doing this, but SOAP makes it easy by using XML and HTTP – which are already standard web formats.
Web Applications and SOAP
Web applications are where SOAP really comes into its own. When you view a web page you are using aweb browser to query a web server and view a web page. With SOAP, you would use your computer client application to query a server and run a program. You can’t do that with standard web pages or HTML.
Right now, you might use online banking to access your bank accounts. My bank has the following options:
- Online banking – account reviews, transfers, stop payment, etc.
- Online bill paying
- Online credit card management
- While this bank has these three applications, they are all mostly separate. So if I go into the banking section I can’t transfer funds from my savings account to my credit card, and I can’t view my account balances while I’m in the online bill paying section.
One of the reasons that these three functions are separated is because they reside on different machines. Ie. the program that runs the online bill paying is one one computer server, while the credit card and bill paying applications are on other servers. With SOAP, this doesn’t matter.
You might have a Java method that gets an account balance called
With standard web based applications, that method is only available to the programs that call it and are on the same server. Using SOAP, you can access that method across the Internet via HTTP and XML.
How is SOAP Used?
There are many possible applications for SOAP, here are just a couple:
- Business to Business integration – SOAP allows businesses to develop their applications, and then make those applications available to other companies
- Distributed applications – programs like databases could be stored on one server and accessed and managed by clients across the Internet
One thing to consider when looking into implementing SOAP on your business server is that there are many other ways to do the same thing that SOAP does. But the number one benefit you’ll gain from using SOAP is it’s simplicity. SOAP is just XML and HTTP combined to send and receive messages over the Internet. It is not constrained by the application language (Java, C#, Perl) or the platform (Windows, UNIX, Mac), and this makes it much more versatile than other solutions.
Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of an organization’s information technology (IT) security. SIEM combines SIM (security information management) and SEM (security event management) functions into one security management system. The acronym is pronounced “sim” with a silent e.
The underlying principle of a SIEM system is that relevant data about an enterprise’s security is produced in multiple locations and being able to look at all the data from a single point of view makes it easier to spot trends and see patterns that are out of the ordinary.
SIEM systems collect logs and other security-related documentation for analysis. Most SIEM systems work by deploying multiple collection agents in a hierarchical manner to gather security-related events from end-user devices, servers, network equipment — and even specialized security equipment like firewalls, antivirus or intrusion prevention systems. The collectors forward events to a centralized management console, which performs inspections and flags anomalies. To allow the system to identify anomalous events, it’s important that the SIEM administrator first creates a profile of the system under normal event conditions.
At the most basic level, a SIEM system can be rules-based or employ a statistical correlation engine to establish relationships between event log entries. In some systems, pre-processing may happen at edge collectors, with only certain events being passed through to a centralized management node. In this way, the volume of information being communicated and stored can be reduced. The danger of this approach, however, is that relevant events may be filtered out too soon.
SIEM systems are typically expensive to deploy and complex to operate and manage. While Payment Card Industry Data Security Standard (PCI DSS) compliance has traditionally driven SIEM adoption in large enterprises, concerns over advanced persistent threats (APTs) have led smaller organizations to look at the benefits a SIEM managed security service provider (MSSP) can offer.
New firewall appliance combines Palo Alto’s Panorama central management platform with ESXi VMs by plugging into the NSX virtual network controller.
When VMware launched NSX earlier this year, it promised a network controller — extensible using published APIs — that allows higher level network services such as firewalls, load balancers and application accelerators to plug in at any point in a virtual network. VMware touted more than 20 partners working on NSX integration. The vision sounded great, but given VMware’s inclusion of several network services in NSX including firewall, load balancing and VPN termination, it was easy to assume that the promised virtual ecosystem was DOA.
Palo Alto Networks has countered that assumption with its firewall appliance for NSX. Selling optional services against a built-in feature is never an easy task, but Palo Alto has taken up the challenge.
The new appliance marries Palo Alto’s next-generation firewall, in virtual appliance form, and Panorama central management platform with ESXi VMs by plugging into the NSX virtual network controller. It’s a logical extension ofPalo Alto’s existing VM-Series by moving the virtual firewall from the VM to the hypervisor, plugging directly into the NSX vSwitch to access all hosts on a given system.
According to Danelle Au, solutions marketing director at Palo Alto Networks, tighter integration into the network control plane via NSX allows better tracking of VM movement, more granular control and easier service insertion to existing VMware infrastructure.
The NSX-Panorama integration means that Palo Alto virtual firewalls now take orders from two masters: the NSX controller for deployment and network insertion (addresses, VLANs, etc.) and the Panorama console for security policy. By using the same security management system as Palo Alto’s hardware appliances, while also being integrated with the NSX network controller, the design facilitates keeping security and server management duties separated, according to Au. Security admins continue to set policy, define rules and monitor events from their existing management console while server admins can deploy and move VMs without worrying about changing network or security configurations.
Key to the automation and dynamic updating of security policy configuration is the use of what Palo Alto calls containers that set security policy based on application, user groups or content. As Au wrote in this blog post, the firewall’s “dynamic address groups feature can now populate application container context directly from VMware so security policies will incorporate the latest attributes of virtual machines.”
Au added that communication between the NSX controller and Panorama security management system results in a fully automated deployment. Once a VM admin provisions applications in the appropriate container, the respective network and security controllers take care of the configuration details. The system also means applications can migrate to different hosts without the server admin having to worry about security implications.
FireEye, ranked the fastest growing communications/networking company in North America on Deloitte’s 2013 Technology Fast 500™, is transforming the IT security landscape to combat today’s advanced cyber attacks and we want you to be part of our team.
FireEye’s disruption in the IT security industry has been all over media outlets such as in BusinessWeek, Bloomberg TV, The Wall Street Journal, Fox News, and several others. A leader in advanced technology, FireEye has received the Wall Street Journal Technology Innovation Award as well as the JPMorgan Chase Hall of Innovation Award. FireEye has also been recognized as one of the top 5 IPOs of 2013 by Wall Street Journal.
Following the acquisition of Mandiant, FireEye is now the ONLY company that can deliver a comprehensive platform to detect, resolve, and prevent advance attacks on a global basis. FireEye is now the go-to company for some of the largest enterprises and government agencies across the globe.
FireEye has invented a purpose-built, virtual machine-based security platform that provides real-time threat protection to enterprises and governments worldwide against the next generation of cyber attacks. These highly sophisticated cyber attacks easily circumvent traditional signature-based defenses, such as next-generation firewalls, IPS, anti-virus, and gateways. The FireEye Threat Prevention Platform provides real-time, dynamic threat protection without the use of signatures to protect an organization across the primary threat vectors and across the different stages of an attack life cycle. The core of the FireEye platform is a virtual execution engine, complemented by dynamic threat intelligence, to identify and block cyber attacks in real time.
The Mandiant Platform connects the dots between our customer’s network security solutions and their endpoints. It equips customers to hunt for adversaries by identifying evidence of compromise and forensic artifacts on their endpoints left behind by attacker activity. Customers apply Mandiant’s intelligence directly and also integrate to SIEM, log management and “next generation” network security solutions to automatically identify threats that are present in their network so they can stop advanced attacks when they are just beginning to unfold.
FireEye has over 1,500 customers across more than 40 countries, including over 100 of the Fortune 500.