Feeds

Some top cloud tools to bash up the bus factor

The path to simplicity

High performance access to file storage

Cloud Few business owners are willing to tolerate a low bus factor on critical endeavours. If your IT infrastructure is based on ten-year-old rebuilt hardware and a heavily customised version of Linux only one or two people truly understand, you’re in trouble.

The simplest means by which the bus factor can be managed is to make the right tools available and ensure that they are used. On paper, VMWare’s vSphere suiteis an expensive alternative to ESXi and some script-fu.

This is false economy. The vSphere suite offers more than lowering the maintenance burden of your systems administrators. It offers business continuity. The proper management tools combined with the proper equipment ensure that any halfway-competent administrator can take over those particular systems.

Simplicity is key and cloud computing exemplifies this. For each service, dozens of providers exist. Each brings their own native toolkit to the table; unique APIs that reduce the long term script-fu. Disparate and incompatible management tools use different terms for similar concepts. Some clouds services offer raw virtual machine access, others offer a platform unto which you can develop your application.

The road to simplicity

One road to simplicity is finding tools that span multiple vendors. For managing the local cloud, open source OpenQRM is a great multi-hypervisor management product. IBM, HP, CA and others have been extending their management stacks to offer similar support. They have the added advantage of being excellent at supporting the underlying hardware as well.

"The hosted cloud still has something of the Wild West about it"

Rightscale, Kaavo, and Zeus are top of mind for offering cross-vendor products for the hosted cloud.

Big names are not left out either; hosted cloud vendors are working to integrate their services with management tools stretching from VMWare’s vCenter to OpenQRM.

If you are comfortable with taking care of provisioning virtual machines on your own – or have existing tools that suit you – consider Rackspace’s recent acquisition Cloudkick. Cloudkick doesn’t offer much in the way of provisioning tools, but it is a fantastic monitoring application covering a diversity of hosted providers. If VMWare is your poison, Cloudkick also offers the ability to monitor virtual machines on your local cloud.

overtaking a bus

Hold the Bus!

The other path to simplicity is that of sourcing your compute resources from a single vendor. The choices are manifold; the hosted cloud still has something of the Wild West about it.

The local computing big shots are all making their cloud plays. The advantage on offer is that of a single provider for all services whether local or hosted. Established internet giants tout their experience at supporting large-scale cloud deployments. The requirements of their own services dwarf all but a handful of other organisations around the world.

The traditional players are only part of the tale; dozens of contenders exist, with more coming out of stealth mode every year. Rackspace is one such example. It is going head-to-head with the established giants on the strength of a commitment to simple yet powerful management tools.

On the other side of the spectrum lies Greenqloud’s play. It is offering compatibility with the big players – your existing management tools will work here – while competing on price and “green” credentials.

Intel’s entrance into this field is of particular interest. Intel has resources that surpass even those of many established players. It has a great deal of cloud experience; its own internal IT systems are enormous. Its target isn’t the developer nor is it the enterprise IT department. The target is small and medium enterprises. A strong focus on powerful – and simple – management tools will emerge as a core component of Intel’s strategy.

Whether you are managing an internal cloud, wrangling hosted services or shuffling workloads between them, reliable management tools are as important to your IT strategy as the people who implement them. Or the vendors that supply them. ®

High performance access to file storage

More from The Register

next story
Video games make you NASTY AND VIOLENT
Especially if you are bad at them and keep losing
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
Gimme a high S5: Samsung Galaxy S5 puts substance over style
Biometrics and kid-friendly mode in back-to-basics blockbuster
Dell Wyse Cloud Connect: Pocket Android desktop
Ultrathin client with a lot of baggage. The upside? It's a rogue sysadmin's delight
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.