Feeds

The State of Network Infrastructure

Does Senior Management care?

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Networks are the glue that allow users to function effectively in their daily tasks, yet a recent report by Freeform Dynamics based on a survey of readers of the Register shows many of you are using old equipment that is hard to manage. This begs the question, “does senior management really care about the state of enterprise networks, or are they happy to take it for granted until something breaks”? (Figure 1)

Figure 1

Figure 1

It is evident that a majority of the networks you operate are fragmented and difficult to manage. The odds are that many of the essentials of your networks may have been put in place over the course of the last five, ten, or perhaps fifteen years. There is even a chance that it was never really architected as a whole but has been built in a disorganized fashion to cater for individual application requirements case by case.

When we asked what problems managing the performance, availability and security of the applications on which your organisations depend, your replies were very clear. (Figure 2)

Figure 2

Figure 2

The majority of readers who took part in the survey confirm there are challenges with respect to application performance and availability. The problems are not only about slow response times or systems being unavailable, but include the question of performance consistency. Fifteen years ago most users were annoyed, if unsurprised, when network connectivity was lost or service quality deteriorated.

Today users complain if performance isn’t consistently perfect, regardless of where they are working, how they are connected or the devices and networks they are using. Perhaps more importantly, over half of Reg readers taking part indicated that unplanned outages are causing business disruption.

This takes us on the question of how good are your management capabilities, and do you see any areas where you should be looking to beef things up? (Figure 3)

Figure 3

Figure 3

The answers you gave in the survey show that you have obvious capability shortfalls evident in nearly every area of network performance and availability. The fact that a majority of readers highlight all areas as targets for improvement confirms you see a real need for them. But what might actually trigger changes to your application delivery networks and how you administer them? (Figure 4)

Figure 4

Figure 4

As can be seen in Figure 4, new ways of handling application delivery requirements can be initiated by a range of events. With nearly four out every five Reg readers acknowledging running old technology with functionality gaps (Figure 2), it is no surprise you see existing equipment reaching end of life to be the most likely initiator of change.

Other triggers for over half of you include major business application upgrades, web site development and increased security demands. Even modifications to regulatory requirements and Exchange / SharePoint upgrades are mentioned by two out of five readers.

The danger is that any modifications to the enterprise application access infrastructure resulting from the investment prompts noted above could simply lead to piecemeal implementation of new networking solutions without changing the way networks are managed as a whole. Such an approach perpetuates the fragmentation you already acknowledge to exist in your networks. It is also likely to further exacerbate any operational management difficulties you have.

A new approach is needed, one where the performance, availability and security aspects of application access for every service are assessed individually. A network then needs to be built able to handle the new demands being placed upon it, one with better management characteristics that demand less of time to keep operational and secure.

The first challenge is to convince your budget holders it’s time to invest in redesigning the corporate application access and security networks. The second, equally daunting, challenge involves how do you upgrade your network architecture and management processes without negatively impacting service levels? This is the IT equivalent of changing the tyres on a racing car while it is tearing around the circuit in the middle of a Formula One Grand Prix.

How are you going to get hold of the time and resources to make these changes and how do you plan to make the upgrades? Let us have your thoughts in the comments below. Equally, if you have already changed things, please let know how you made the transition.

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.