Skip to main content

The ebb and flow in technology deployments!

Back home in Boulder again - and this is my Boulder office. For those of you who were present at the closing session of the ITUG 2005 Summit, you may recall the gift I received from Volker Dietz - a painting created for the Tandem Germany office. It's now framed and takes pride of place in my office.


I am pleasantly surprised with the readership this blog is receiving and with the number of good comments being posted. Just to let you know more about how this works, at the request of ITUG, all comments that are posted are sent my way before appearing on the blog – I can accept, or reject complete postings – but I cannot edit them. So what you see posted is what was submitted – in total.

I am also pleased with the marketing done by others – already the link to this blog is being promoted in other newsletters – electronic and printed. Watch for even more references in upcoming ITUG Connection issues. I have always been a fan of “guerilla marketing” and the support I am receiving is clear evidence to me that this is always a good avenue to pursue – especially for support of a medium like this blog.

The dialogue I am having with a number of HP NonStop product managers is also encouraging. Having said this, I understand HP has a policy in place that really does limit how much feedback is provided to issues and comments posted in a blog – for HP, as you can imagine, there’s just a lot of topical blogs out there and it would be an endless, and perhaps thankless pursuit, to chase down every one of them and to sort out the fact from fiction. The channel they do watch is obviously the SIG discussion forums – and I just want to reinforce the necessity for maintaining SIGs exchanges. My blog is intended to complement these more formal channels, and not to replace them.

Having said that, I am particularly interested in any comments you elect to post about new clients and new applications for the Integrity NonStop server. I hear a lot of buzz that’s anecdotal about this agency purchasing a large NonStop server, and about a new NonStop server being deployed for that new application. Later this year I am going down to Singapore to look at one such new customer deployment.

There’s a lot that I hear, but like many of you, until it comes out in a press release, it’s hard to just jump in and talk about it. And there are some categories of users, government agencies in particular, especially any to do with state or homeland security that could tell you about this new application or that new deployment – but then perhaps they would have to kill you, if you know what I mean. But I have to add, from some of the licenses I have seen being prepared even within my own company – there are some pretty big configurations out there that are still covered by nondisclosure.

So, where it’s appropriate, just add a comment or two to let me know what you are hearing about and I will follow-up and report back on this blog. It’s very important for most of us to know that the need for NonStop is still alive, and that fault tolerant servers remain a much sought-after solution.

There are a lot of external factors now that suggest we are returning to a “centralized deployment model” once again. For as long as I have been associated with IT, I have watched the ebb and flow that takes place between IT groups and business units. Companies have let the end users add more smarts into their groups and then, over time, re-thought the deployments and moved whatever smarts were deployed back into the data center.

Whether it was out of frustration over the timeliness of a new application, the angst over the inflexibility of legacy applications, or quite simply the discomfort over the manner in which some IT chiefs used information in much the same way as feudal chiefs did back in the dark ages, there was always the potential to argue strongly for local control of selected information.

From distributed computing with remote minicomputers, to client/ server computing with departmental servers, or even today, with web services and the multi-tier architectures that they introduce, the arrival of each of these has spawned the appearance of computing power outside of IT’s direct management control.

Distributed computing fell out of favor as the people costs skyrocketed – just how many people were hidden inside headcount allocations that were really working on IT support? How much additional software did we need to oversee it all? Client / Server began to loose ground when we added up how much we were paying for the Wintel platforms springing up everywhere – and companies could not standardize on anything with the arrival rate of new applications that was exceeding the then-current tracking systems. When even Dell said it couldn’t fill some major orders because the technology would change across the delivery timeframe then yes, customer did have every right to question the value proposition.

The latest push for some centralization is coming from two sources – security, and the need to reduce the energy bill. I heard a term for the first time, only a few months back, when a client talked about a new metric – MIPS per Kilojoules! It turns out that in some markets – the island of Manhattan being one – that only so much power could be delivered. In the ongoing battle to balance computing power with heating / cooling needs, trade-offs were being made to the point where you could introduce no additional processing power.

Security these days has more to do with compliance than with shutting off access, I suspect. Recent legislation has made the whole process onerous, but like just about anything else tied to government, now that legislation is in place and agencies established to monitor, I can’t see us changing it any time soon.

Energy, and security, are among the most widely covered topics in the press and on the web. Back at a Gartner Symposium and IT expo in 2003, researchers Carl Claunch and Al Lill said in their keynote presentation “Gartner Predicts: The Future of IT” that we will see the next massive wave of innovation and demand for IT starting in 2006 and the drivers will include:

Transition to SOA
Low power consumption mobile devices
Secure broadband networks
Real Time Infrastructures

Gartner has its critics, for sure, but I recently paged through this particular presentation and found its accuracy uncanny. SOA, Security, Real Time, and Energy Usage are all front and center in most discussions I have participated in lately.

And this bodes well for the future on Integrity NonStop. This is a definite elevation in visibility of a platform that highlights the support of many of the above drivers and includes mature technology options among the platform’s attributes.

So, as this blog continues to develop and as the guerilla marketing expands and more of the NonStop community shares information, I would really like to get more feedback from you all on the many daily successes you experience from you own internal promotion of NonStop. Large, highly energy-efficient and extremely secure server packages, have now become very important. And to paraphrase a well-known declaration by an Ork in Lord of the Rings: “Well boys, look like NonStop is back on the menu”!

Comments

Anonymous said…
Richard -

I wish you luck in getting information on current and new installations. That is always of great interest to the NonStop community - new names in the NonStop world, new applications in the NonStop world.

I for one try to get any case study I can on active/active implementations for the Availability Digest. It is like pulling hens' teeth. Most companies do not want to expose what they are doing for competitive or legal reasons. I hope that this doesn't extend to people feeding you information.

By the way, if you or anyone else know of a system that I could do a case study on, please let me know.
Anonymous said…
I can't say I don't appreciate the press that security gets, if I am to be honest.

In doing research myself, I often come across the same Gartner quote time and time again. I suppose its over-use can be attibuted to its accuracy and the fact that you can't say it any clearer than this:

"Enterprises that implement a vulnerability management process will experience 90 percent fewer successful attacks than those that make an equal investment only in intrusion detection systems."

Mark Nicolett
Security & Privacy, Gartner, Inc

LisaP
Richard Buckle said…
So Lisa, what you are saying really here is that unless you look at the whole thing, just preventing the obvious intruder is only a band-aid and not guaranteed to protect you from more serious attacks including those from within. That about right?
Anonymous said…
Its a generally accepted statistic that the majority of breaches at financial institutions and big companies (like NonStop users) usually come from within. Be they intentionally malicious or just a grave error on the part of someone with too much authority in their logon.

LisaP

Popular posts from this blog

If it’s June then it’s time for HPE Discover 2021.

  For the NonStop community there has always been an annual event that proved hard to resist; with changing times these events are virtual – but can we anticipate change down the road? Just recently Margo and I chose to return home via US Highway 129. It may not ring any bells, but for those who prefer to call it the Tail of the Dragon – 318 curves in 11 miles – it represents the epitome of mountain excitement. For Margo and me, having now driven the tail in both directions, driving hard through all these turns never gets old. Business took us to Florida for an extended week of meetings that were mostly conversations. Not everything went to plan and we didn’t get to see some folks, but just to have an opportunity to hit the road and meet in person certainly made the 4,500 miles excursion worthwhile. The mere fact that we made touring in a roadster work for us and we were comfortable in doing so, well, that was a real trick with a car better suited to day trips. This is all just a p

The folly that was Tandem Computers and the path that led me to NonStop ...

With the arrival of 2018 I am celebrating thirty years of association with NonStop and before that, Tandem Computers. And yes, a lot has changed but the fundamentals are still very much intact! The arrival of 2018 has a lot of meaning for me, but perhaps nothing more significant than my journey with Tandem and later NonStop can be traced all the way back to 1988 – yes, some thirty years ago. But I am getting a little ahead of myself and there is much to tell before that eventful year came around. And a lot was happening well before 1988. For nearly ten years I had really enjoyed working with Nixdorf Computers and before that, with The Computer Software Company (TCSC) out of Richmond Virginia. It was back in 1979 that I first heard about Nixdorf’s interests in acquiring TCSC which they eventually did and in so doing, thrust me headlong into a turbulent period where I was barely at home – flying to meetings after meetings in Europe and the US. All those years ago there was

An era ends!

I have just spent a couple of days back on the old Tandem Computers Cupertino campus. Staying at a nearby hotel, this offered me an opportunity to take an early morning walk around the streets once so densely populated with Tandem Computers buildings – and it was kind of sad to see so many of them empty. It was also a little amusing to see many of them now adorned with Apple tombstone markers and with the Apple logo splashed liberally around. The photo at the top of this posting is of Tandem Way – the exit off Tantau Avenue that leads to what was once Jimmy’s headquarters building. I looked for the Tandem flag flying from the flagpole – but that one has been absent for many years now. When I arrived at Tandem in late ’88 I have just missed the “Billion Dollar Party” but everyone continued to talk about it. There was hardly an employee on the campus not wearing the black sweatshirt given to everyone at the party. And it wasn’t too long before the obelisk, with every employee’s signature