|This generation of web services got their start from LAMP – a stack of simple, yet powerful technologies that to this day is behind a lot of popular web sites. The beauty of LAMP is in its simplicity; it makes it very easy to get a prototype out the door. The problem with LAMP is in its scalability.
Alex Iskold, Reaching for the Sky Through The Compute Clouds
The first scalability issue is fairly minor – threads and socket connections of the Apache web server. When load increases and configuration is not tuned properly you might run into problems. But the second problem with LAMP is far more significant: the MySQL relational database is the ultimate bottleneck of the system.
Lately I’ve been reading about the future of the LAMP stack, which I always thought of as the poster child for Web 2.0. Alex got me wondering about the future of LAMP now that everything is cloud-colored. Will MySQL be the bottleneck? But then I read this article about Sun Microsystems throwing “more chips into its “billion-dollar bet on the LAMP stack” with the recent launch of its MySQL Enterprise 2008” and now I’m not so sure that LAMP is on its way out.
|If you can increase your capacity simply by adding another twenty nodes to your infrastructure (such as with standard clustered LAMP deployments) you should try putting a few nodes in a cloud for a month and see if it works for you.|
|“Cloud computing” is an apt name for a technology that is many things to many people. Although each vendor that enters the space seems to have a different approach to cloud services, all of them face a common challenge: coming up with an achievable service guarantee to reassure hesitant customers.
Erika Morphy, Cloud Computing, Part 3: SLA Spirit in the Sky
Take the tech challenge for service level agreement.
|Cloudbursting is an application hosting model which combines existing corporate infrastructure with new, cloud-based infrastructure to create a powerful, highly scalable application hosting environment.
Jeff Barr, Cloudbursting – Hybrid Application Hosting
I could have come up with some kind of lifeless and forgettable acronym, but that’s not my style. I proposed cloudbursting in a meeting a month or two ago and everyone seemed to like it.
I really like Jeff Barr and usually agree with his observations, but this time I think he missed the boat…er cloud. The term cloudburst doesn’t really describe a hybrid model at all. And it has a negative connotation. And it’s already been used in the blogosphere to describe what happens when your cloud is unavailable.
Remember Microsoft’s Hailstorm? Not a good name either. Still, I can see why Jeff didn’t want to just slap an ordinary acronym on the concept. Hybrid Application Hosting. HAH?
We need to put on our thinking caps and help him out.
|Earlier performance-enhancing technologies, such as MPLS, helped support video as one of many applications. Now it’s time to address video as the main application.
Suraj Shetty, as quoted in Cisco, anticipating video tsunami, builds up network smarts
I’m keeping an eye on the Cisco Media Processing platform. The takeaway is that Cisco is taking another step to position themselves as the company that’s going to help network administrators handle video traffic better.
Cisco marketing is pushing the idea of “Medianet.” The idea is that an intelligent network will understand what format to convert the video and then the hardware will transcode the video so it can play on any device, including digital signage (another area Cisco has been positioning themselves as Number 1). Video transcoding converts the content into different formats so it can be viewed on different types of devices. It’s key to managing bandwidth and storage and it’s been a real brick wall for video.
The first product for Medianet is called the Cisco Media Experience Engine 3000, otherwise known as MXE. It’s expensive — $50k — and I’m not quite sure yet who the customer is. Cisco also introduced the Cisco Advanced Video Services Module (AVSM). It’s part of the Cisco ASR 9000 edge router. The literature says AVSM enables “terabytes of streaming capacity at the aggregation edge while simultaneously offering content caching, ad insertion, fast channel change and error correction.”
|We knew that the volume of new attacks and the vectors used were only going to increase, so we chose to stay ahead of the curve with a behavioral analysis system. I believe behavior and anomaly-based solutions will be most effective long term.
Jamie Arnold, as quoted in SUNY’s Binghamton Monitors Network with Lancope’s StealthWatch
I spent part of the morning reading about anomaly-based network monitoring. In October, IBM announced that they would no longer sell the IBM Proventia Network Anomaly Detection System (ADS). Stealthwatch seems to be getting a lot of buzz, especially with college campuses whose biggest threats probably come from right inside the network.
|Facebook Connect, which was announced in May and is being rolled out this week, allows you to use your Facebook login to access Facebook’s partner web sites, then broadcast what you are doing on those sites to everyone on Facebook. It’s like Facebook Beacon — minus the marketing sleaziness.|
|The hierarchical and rigid structure [of the traditional organizational structure] results in extreme specialization of job functions and a large number of job classifications; it is incompatible with the team approach of lean production, in which workers perform many tasks and have few job classifications.
Earll M. Murman, Ph.D., From lean production to lean enterprise
Got a minute? Take today’s quiz!
Product manager Robert Stromer demos Cisco SFS 7000 Series InfiniBand server switches.
[kml_flashembed movie="http://www.youtube.com/v/jzSGJSNVOoQ" width="425" height="350" wmode="transparent" /]
Brock, from Saint Paul, MN shows off a new cluster from Penguin Computing – including the storage controller and the InfiniBand switch.
[kml_flashembed movie="http://www.youtube.com/v/a7Ya7jXlKS4" width="425" height="350" wmode="transparent" /]
|With the introduction of virtual port technology, the common pooled resources of virtual cells can be partitioned into multiple virtual WLANs, with a unique WLAN for each user device; the dedicated virtual WLAN moves with the user as long as his device is connected to the wireless network.|
As with wired switches, the network has full control over the resources and services allocated to a given device. Because the device is “sandboxed” in its own virtual WLAN, the user has a highly reliable wired-like experience, with full access to appropriate resources yet protected from disruptions by other users’ network demands. When devices are partitioned into their own dedicated virtual WLANs, the network can control client behavior in ways that proprietary client driver extensions and AP radio management technologies cannot – without adding any client software. As with virtual cell technology, virtual port technology is fully based on IEEE 802.11 standards.