Professional Documents
Culture Documents
Chap 7 - New Syllabus ICT 554
Chap 7 - New Syllabus ICT 554
IT infrastructure Emerging
Technology, Trends and
Issues
7.1 Emerging Trends of
IT Infrastructure
7.1.1BIG
DATA
Big Data Infographic
Big Data Architecture
7.1.2
VIRTUALIZATION
https://www.youtube.com/watch?v=hPkEqOoQSu4
https://www.youtube.com/watch?v=V9AiN7oJaIM
https://www.youtube.com/watch?
v=iBI31dmqSX0
Virtualization is the creation of a virtual copy of a
physical computer. The benefits of virtualization are
vast – it cuts hardware expenses, and increases the
productivity and speed of operations.
What is virtualization?
Network Virtualization
Server Virtualization
Desktop virtualization
Hardware virtualization Refer to
this link for
Software virtualization detail
explanation
Storage virtualization
https://itmagic.pro/blog/10-benefits-of-virtuali
zation-guide-to-advance-your-business
Types of Virtualization
Benefits of Virtualization
https://itmagic.pro/blog/10-benefits-of-virt
ualization-guide-to-advance-your-business
https://www.youtube.com/watch?v=3WIJ4axzFlU
https://www.youtube.com/watch?v=_n5Le8aePB4
https://www.youtube.com/watch?v=cs48Yr_lUxc
https://www.youtube.com/watch?v=qbKCukjgJVs
https://www.youtube.com/watch?v=jOewMqQlxo8
What is Hyperconvergence?
https://www.youtube.com/watch?v=2IUX
6swaOC4
https://www.youtube.com/watch?v=qbKC
ukjgJVs
https://www.youtube.com/watch?v=v1bZ
Iv4_Pz4
https://www.youtube.com/watch?
v=cs48Yr_lUxc
Videos on Hyperconvergence
7.1.5 NEXT GEN OF
FIREWALLS
https://www.youtube.com/watch?
v=y8zZzG9fsmU
A next-generation firewall (NGFW) is a hardware-
or software-based network security system that
is able to detect and block sophisticated attacks
by enforcing security policies at the application
level, as well as at the port and protocol level.
Traditional firewall - includes a device that is
able to control the traffic that is allowed to enter
or exit a point within the network. It can typically
do this either using a stateless method or a
stateful method depending on the type of
protocol being run on it.
What is NGFW?
To understand what the word Stateful refers to, let us
look at an analogy.
Consider the scenario of a telephone call. In this case, the
connection is maintained from the beginning to the end of
the call to ensure continuous communication.
The connection is validated first, and only then will the
session be established indefinitely until the end of the
talk.
This is exactly what a stateful protocol is. If a client
delivers a request to the server in a stateful protocol, it
expects a response of some sort.
If it does not receive a response, it will send the request
again.
What is IoT?
The new rule for the future is going to be, "Anything that can be
connected, will be connected." But why on earth would you want
so many connected devices talking to each other? There are
many examples for what this might look like or what the potential
value might be. Say for example you are on your way to a
meeting; your car could have access to your calendar and already
know the best route to take. If the traffic is heavy your car might
send a text to the other party notifying them that you will be late.
What if your alarm clock wakes up you at 6 a.m. and then notifies
your coffee maker to start brewing coffee for you? What if your
office equipment knew when it was running low on supplies and
automatically re-ordered more? What if the wearable device you
used in the workplace could tell you when and where you were
most active and productive and shared that information with
other devices that you used while working?
What is IoT?
7.1.7 Beacon
https://www.youtube.com/watch?v=eGJYaku0V9Y
https://www.youtube.com/watch?
v=2YorsgulwdU
Beacons are small computers, roughly the size of a
standard Wi-Fi router. As part of indoor positioning
systems, beacons use proximity technology to detect
human presence nearby and trigger pre-set actions to
deliver informational, contextual, and personalised
experiences.
When a user walks past an area where an indoor
positioning system is set up, a beacon sends a code
with a message to their mobile device. Here app
solutions come forth: this coded message, which is
shown in a form of a notification, can only be viewed
with a mobile app (third party or brand mobile app).
https://www.youtube.com/watch?
v=lwnmx-5mBLM
http://www.xentralmethods.com/beacon/
Solution - A simple solution to this challenge would be to employ new general purpose graphical
processors or multi-core platforms. By using better systems, the existing software will have to be
optimized and adjusted to provide the best results. Many projects have been started to develop faster
computers which will be available at low costs and energy needs.
Solution - IT managers need to look out for high-performance computing resources with huge data sets
and a secure bridge to collaborate with dispersed scientific teams. They will also need to employ more
sophisticated means to collect, filter and store using high-speed networks.
Solution - This challenge can be solved by using distributive systems. These systems divide complex tasks
into smaller independent bits which can be processed by individual computers which are connected to a
network. Grid computing consists of virtualization of resources and supports computations across multiple
administrative domains and helps in speeding up the processing of complex tasks.
4. Lack of Efficient Data Storage Architectures
Challenge - Cloud storage has taken over in most of the cases in the modern world. Though it is a cost-
effective and scalable alternative for data storage for IT managers, it does not provide the required data
storage architectures which can accommodate a variety of applications. The IT community needs
something more flexible which is beyond space and cost in cloud storage options.
Solution - It is important that the cloud storage options become more flexible to improve the IT
infrastructure. It should be easy to optimize the cloud storage architecture according to the application
which is being deployed. It needs to be more reliable, efficient and be able to handle a variety of
applications and needs of the user community. The cloud storage options need to serve as long-term and
archival instead of a short-term solution for the IT community.
Solution - The best solution to solve this problem would be to have an ideal system which would consist of
a standards-based framework facilitating easy data transfer between different tools and layers. This will
help in faster data transfer and hence better data analysis. This analytics would be used for industrial
control systems and for network and IT monitoring.
Solution - The ability to migrate the IP address would help to allow application services to be migrated to
other hardware. Another solution to this challenge would be to add intelligence to the wired as well as Wi-
Fi network connections. This will help the networks to optimize the traffic delivery to contain costs and
improve the service.
12 Challenges Facing by IT
Professionals
1. New Technology
Technology advances rapidly and shows up in media on all sides. This
means users, managers at all levels and even competitors pressure IT
staff to implement this new technology just because it is new. The real
challenge is deciding which of these new technologies will work to the best
interest of advancing the organization and which is better to avoid for
now.
Organizational priorities and long-term goals tend to remain relatively
static. Technology has become much more fluid and changes more rapidly.
IT management must evaluate the organizational value each technology
offers to determine when and if it is a good fit.
New technologies such as cloud, big data, virtualization and mobility all
become tools for experienced IT managers who understand their
organization's priorities. Since every organization is different, the IT value
of each new technology will vary with the organization's strategic goals.
To provide the best value to the organization, big data analytics requires new
approaches to capturing, storing and analyzing data. The massive amount and growth
of unstructured data rapidly outpaces traditional solutions and calls for new volume
handling. Big data is collected from new sources. Traditional data management
processes fall short in coping with the variable nature of big data. New analytics offer
methods to process the variety. Data is generated in real time and the demands call for
usable information to be ready as needed. Solutions like 100 GB Ethernet, parallel-
processing, and SSDs (Solid State Drives) offer good response times.
4. Virtualization
Virtualization continues to expand from desktops to servers to switches, routers and
firewalls. Virtualization will provide a much higher level of control of these devices
rather than saving money. In fact, the organization's infrastructure will require
larger servers, more VM licenses, and emulation software in addition to the
continuing cost of desktop licenses.
A virtualized data center requires many of the same management tasks that also
must be performed in the physical server environment. These tasks need to be
extended into the virtualized environment as well as also integrated with the
existing workflow and management processes.
One example is that IT organizations must be able to automatically discover both
the physical and the virtual environment and have an integrated view of both
environments available for monitoring and managing. That view of the combined
virtual and physical server resources needs to stay current as VMs move from one
host to another. The view must also be able to indicate which resources are involved
in the case of fault or performance issues.
The Distributed Management Task Force (DMTF) set its Virtualization Management
(VMAN) standard. That includes a set of specifications to address the management
lifecycle of a virtual environment. VMAN's Open Virtualization Format (OVF)
specification provides a standard for describing virtual machines and applications for
deployment across various virtualization platforms. VMAN's profiles now standardize
many aspects of the operational management of a mixed vendor virtualized
environment.
5. BYOD and BYOA
For years, IT has controlled user's devices. With the advent of
smartphones and tablets, that has changed. Users now bring in their
own devices without IT's knowledge. They use them for both
personal and work-related tasks. IT's initial plan was to attempt to
maintain control. The facts are clear: Controlling user-owned devices
in an organization's network is nearly impossible.
When a user brings their own device, they will also bring their own
applications that they have grown used to using. That is a plus for
productivity and a challenge for IT security. IT managers and CIOs
will need to decide what to secure: the network infrastructure or the
organization's data.
Suggestions:
When end users and managers are less satisfied with the service
and support they receive from IT, they begin to look for other
options. The solution is less about controlling an emerging
Shadow IT. It's really about training the IT department to better
communicate with and support the needs of the organization.
7. Boomers
Starting in this year, about 10,000 baby boomers will become eligible to
retire every day for the next 15 to 20 years in North America. A lot of
those potential retirees are IT people who have years of both IT and
organization-specific knowledge and experience.
The entry-level people coming into the workforce are much more loyal to
themselves, what they know and in some cases, to their peers than to the
organization. They arrive with different skill sets and new ways of looking
at and using technology.
To deal with retirements and the possibility that younger workers may stay
less time, there are two basic alternatives. One choice is a mentoring
program so those people who need to be replaced can share their knowledge
with their potential replacement in sufficient time to complete the exchange
smoothly before retirement. Another solution is giving newer IT workers
projects outside of their comfort zone, more training and other opportunities
to learn something different and as a result become less vertically focused.
As they complete these projects they move to other new areas and projects.
8. Interoperability
Users and customers are more demanding of the products
on their desktops and mobile devices. It all comes down to
communicating with each another. Systems need to send
and receive data that will be compatible on all user
platforms.
Open applications and systems built on open standards are
the way of the future. Development efforts must focus on
the system or application itself as well as how that
system/application works with others.
IT managers must develop applications that adjust to the device the users
have available. Some will turn to responsive design that creates a more fluid
display to adjust to the screen size variations. Others use the adaptive
approach that designs the display to match the desired screen size.
10. Energy Efficiency
According to most estimates, a 25,000 square foot data center will use
about $4 million in energy this year. At that rate, a savings of just a few
percent can make a big difference to an IT budget. With an increasing
trend of expanding green initiatives and alternate sources of energy,
organizations are working on ways to improve energy monitoring and
efficiency.
There's an emerging market of tools for energy monitoring and efficiency.
More than 25 vendors have entered this market. These tools monitor
consumption at the device level and, in some cases, at the application
level.
Resources and tools are readily available to help IT and data center
managers benchmark energy use, monitor ongoing trends, identify any
savings opportunities, and adopt the most energy efficient practices.
11. Creating value
This is a recurring IT issue. It's now a priority. IT
departments must focus on improving service to the
organizational user and to the organization's departmental
needs. To do so, IT managers must remove any non-
essential activities that are in the way.
That means a different way of outsourcing non-core
activities to keep the focus on value creation. This
outsourcing means moving as many services to the cloud
as possible. Why own or maintain software or hardware?
Small or mid-sized firms can easily rely on the cloud for
standardized services.
CONCLUSION