@CloudExpo Authors: Pat Romanski, Elizabeth White, Yeshim Deniz, Liz McMillan, Zakia Bouachraoui

Related Topics: @CloudExpo, Containers Expo Blog

@CloudExpo: Article

The Role of the Network in New Virtualization and Cloud Computing Initiatives

The network industry's new vision: infrastructure 2.0

Despite the gloom and doom in the news, no one seems to be predicting that the spread of TCP/IP will be slowed by a global recession. Most analysts are more concerned with how the network will be monetized and the role it will play in new virtualization and cloud computing initiatives. That means that the networking industry needs to articulate its relevance to these initiatives more forcefully as IT automation initiatives continue to connect to the static TCP/IP network. A weak economy will also make the business case a more significant part of the sales process, which will increase the pressure on networking vendors to automate core network services, thereby setting the stage for dynamic network infrastructure capable of keeping up with new dynamic systems and endpoints.

The good news is that dynamic infrastructure can deliver for the CIOs (especially in terms of real-time visibility into the condition of the network and devices attached) what relational databases (e.g., Oracle) delivered for the CFO. It can enhance availability, reduce TCO, and make networks more capable of keeping up with increasing velocities of change. As networks become increasingly strategic to business operations (and the availability of dynamic, automated systems), this vision becomes glaringly obvious to even the most tactical network teams.

Clouded Visions of the Network Prevail
Many in the virtualization and cloud communities think that the network is irrelevant. You can't blame them. The real problem is that the networking vendors have, for the most part, been caught flat-footed by the rise of system and endpoint automation. Perhaps many of their customers are still playing the CIO Shell Game and wondering why none of their initiatives are quite living up to their promises.

I've mentioned the exceptions, but one has to wonder how the other network vendors succumbed to the "speeds and feeds" trap that ultimately devalues network hardware and drives innovation (and IT budgets) outward into systems and endpoints. Their lack of vision also puts the network business case at increasing risk as limited budgets meet the rising tide of manual requirements to keep networks in sync with higher rates of change required by new initiatives.

We've talked about the recent evidence of large enterprise networks already showing increasing strains as they grow more complex and incur higher velocities of change. This increasing gap between network capabilities and emerging demands is the biggest threat and opportunity for all networking vendors. It also risks throttling back the business case for these new initiatives. Increasing automation of systems without network automation puts network teams on an oscillating tightrope.

A Weak Economy Will Only Increase the Pressures
As the economy weakens and growth transforms into shrinkage in some strategic sectors, network hardware decisions are going to be driven increasingly by ever more demanding business case scenarios. Those vendors who deliver on the promise of automation, visibility, and control will displace the "speed and feed" commodity hardware gamers of the last three decades. This suggests that the networking industry is about to bifurcate into two camps: the automated and the dead.

If you follow this column, you've seen this diagram before, with a switchboard symbolizing one of the last bastions of manual labor in IT: the collections of freeware, spreadsheets, and configuration and change management tools that have managed to survive decades of innovation in network, endpoin,t and application intelligence. I've updated it slightly to reflect the spirit of static infrastructure.

To a great extent, this contrast between automation in systems and various pockets within the network and the high-risk, high-cost elements of manual labor in the core network services that all networks rely on is one of the key barriers to Infrastructure 2.0. These services help to establish connectivity intelligence between the network and endpoints. They are the equivalent of yesterday's operator switchboard, which was rendered obsolete by heavy investments in automation that started decades ago. When you automate these services, you make your infrastructure more dynamic, more capable of keeping up without requiring layers of manual intervention, which adds risk and expense.

As these core network services (including DNS, DHCP and IPAM or IP address management) are automated, the business case for the network and new initiatives improves significantly and TCO goes down. This is the catalyst for the next boom in the network.

The above diagram shows an increase in network, application and endpoint intelligence enabled by connectivity intelligence, or feedback loops between networks and applications. Those feedback loops set the stage for new innovations driven by the collision between new requirements (including virtualization and cloud) and new capabilities (driven by connectivity intelligence).

In coming years new companies will be funded addressing issues once thought impossible because of the rising rates of manual labor factored into maintaining ever-growing networks experiencing higher rates of change. New initiatives will also emerge from the network vendors that understand the link between dynamic infrastructure and dynamic growth opportunities. Improving business case will drive more growth and perhaps healthier margins.

For the enterprise, dynamic infrastructure promises to make the network strategic yet again. Networking pros and IT execs can focus on policy versus simply trying to preserve availability while keeping up with even more moves, adds and changes.

More Stories By Greg Ness

Gregory Ness is the VP of Marketing of Vidder and has over 30 years of experience in marketing technology, B2B and consumer products and services. Prior to Vidder, he was VP of Marketing at cloud migration pioneer CloudVelox. Before CloudVelox he held marketing leadership positions at Vantage Data Centers, Infoblox (BLOX), BlueLane Technologies (VMW), Redline Networks (JNPR), IntruVert (INTC) and ShoreTel (SHOR). He has a BA from Reed College and an MA from The University of Texas at Austin. He has spoken on virtualization, networking, security and cloud computing topics at numerous conferences including CiscoLive, Interop and Future in Review.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

CloudEXPO Stories
Most modern computer languages embed a lot of metadata in their application. We show how this goldmine of data from a runtime environment like production or staging can be used to increase profits. Adi conceptualized the Crosscode platform after spending over 25 years working for large enterprise companies like HP, Cisco, IBM, UHG and personally experiencing the challenges that prevent companies from quickly making changes to their technology, due to the complexity of their enterprise. An accomplished expert in Enterprise Architecture, Adi has also served as CxO advisor to numerous Fortune executives.
Eric Taylor, a former hacker, reveals what he's learned about cybersecurity. Taylor's life as a hacker began when he was just 12 years old and playing video games at home. Russian hackers are notorious for their hacking skills, but one American says he hacked a Russian cyber gang at just 15 years old. The government eventually caught up with Taylor and he pleaded guilty to posting the personal information on the internet, among other charges. Eric Taylor, who went by the nickname Cosmo the God, also posted personal information of celebrities and government officials, including Michelle Obama, former CIA director John Brennan, Kim Kardashian and Tiger Woods. Taylor recently became an advisor to cybersecurity start-up Path which helps companies make sure their websites are properly loading around the globe.
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a member of the Society of Information Management (SIM) Atlanta Chapter. She received a Business and Economics degree with a minor in Computer Science from St. Andrews Presbyterian University (Laurinburg, North Carolina). She resides in metro-Atlanta (Georgia).
SUSE is a German-based, multinational, open-source software company that develops and sells Linux products to business customers. Founded in 1992, it was the first company to market Linux for the enterprise. Founded in 1992, SUSE is the world’s first provider of an Enterprise Linux distribution. Today, thousands of businesses worldwide rely on SUSE for their mission-critical computing and IT management needs.
Mid-sized companies will be pleased with StorageCraft's low cost for this solution compared to others in the market. There are no startup fees, our solution has a predictable monthly cost, highly competitive pricing and offers ongoing value for our partners month after month. By enabling pooling and StorageCraft's 30-days of free virtualization the company removes several concerns surrounding machine size management and disaster recovery testing costs that add to the complexity of implementing a disaster recovery solution. In addition, their One-Click orchestration makes it simple to recover when needed, as all the work to setup a network and different connections is already complete.