Scaling Infrastructure in the Cloud: Scale Up or Scale Out?

 

 

 

 

 

 

 

One of the most attractive benefits of cloud computing for companies is the ability to scale their IT infrastructure. Scaling, in the context of the cloud, refers to a company’s ability to adapt its IT resources to meet changing demand. The cloud allows companies to scale data storage, networking, and processing power using their existing infrastructure, with minimal disruption and downtime.

 

In this blog, we are going to examine two common methods for cloud scaling: scale up and scale out. We’ll explore indicators of a need for scalable solutions, the difference between the two options, and important considerations you need to keep in mind when making the decision.

Signs it’s Time to Scale

If you’re currently operating in a on-premise server or cloud environment, there are a number of scenarios that can drive your need to scale your network’s capabilities:

  • Performance: The first and most obvious symptom of a cloud infrastructure in need of expansion IT resources is performance. If your website is hosted on an overtaxed server for instance, load times can be negatively affected. Studies have shown that 46% of users don’t revisit websites that perform poorly and just a 1-second delay in load time can reduce customer satisfaction by 16%.
  • Maintenance Requirement: Perhaps your server is performing great, but your network requires some sort of maintenance work. If you only have one server, maintenance equals costly outages. Scaling additional resources can dedicate one node to do the maintenance while another handles the workload.
  • Seasonal Fluctuations: If you operate in a market that sees significant seasonal changes in demand, scaling can help you temporarily add resources to meet it and remove them when they’re no longer needed.
  • Development need: If your company is undertaking a significant development project with a dedicated team of programmers and developers, spinning up additional cloud resources to dedicate infrastructure capacity to that team can help to ensure the rest of the business resources don’t take a hit.
Scaling Up vs. Scaling Out

The cloud provides companies with the ability to be nimble from an IT infrastructure perspective. As resource needs change, you can quickly adapt. But there’s more than one way to do it.

Scaling up refers to adding additional resources, like memory, hard drives, and CPUs to your existing physical server. Scaling out, on the other hand, refers to adding additional servers to the system to spread the workload across more machines, increasing capacity and performance.

Scaling up is often the solution of choice for meeting seasonal demand. It is also an ideal solution for organizations with a relatively small dataset, who don’t expect that data to grow exponentially in the next three to five years. It involves fewer resources and is typically the less expensive route to take.

If you are managing data for a larger organization with 30 terabytes or more of backup data or are expecting significant growth in the years to come, scaling out is the better option.

Depending on the resources available in your organization, you may or may not be able to dedicate someone to manually monitor usage and make scaling decisions in real time. Autoscaling allows your cloud environment to anticipate surges in business activity or unexpected traffic and take action automatically. Autoscaling is more typical in large enterprises, where the cloud is harder to manage because there are more resources housed in it. Smaller companies with less dramatic fluctuations in demand are usually able to manage scaling manually.

Risks and Challenges of Scaling Without the Cloud

As available technological capabilities grow, the volume of resources needed to support them grows as well. It’s important to consider the business impact of not having enough resources available when you need them. If you’re currently managing everything with on-premise servers, you’re likely already seeing some of the limitations. With a cloud-based infrastructure, upgrades that used to take two to three months to complete can be done in a few clicks of a mouse.

The decision of how to scale for the unique needs of your company is an important one. You must take into consideration what you need from an application perspective and the strengths and weaknesses of various cloud providers to avoid overpaying for resources you don’t or won’t need. Business priorities change over time and sometimes seemingly unrelated decisions can affect your needs. It’s important that you continuously monitor shifts in demand for cloud resources, and adapt accordingly to ensure you’re getting the maximum ROI from your investment.

Which Scaling Direction is Right for You?

Applied Technologies works with clients to evaluate the performance of their  data storage and compute infrastructure, understand challenges and issues they are facing, and present options tailored to overcoming them. We then partner with companies like NetApp, Cisco, VMware, Unitrends, and Veeam to develop a solution to help clients scale their infrastructure from where they are with their cloud capabilities to where they want to be. If you’re ready to explore a more scalable IT infrastructure, contact Applied Technologies to get the conversation started.

 

The Five Biggest Business Benefits of Utilizing SD-WAN

SD-WAN

 

 

 

 

 

 

 

For many years, traditional wide area network (WAN) technology has been the standard for IT, voice, and data networking in organizations of all kinds. WANs connect local area networks in multiple office locations together through routers and virtual private networks. As the demand for cloud activity in business has increased traditional WANs have struggled to keep up, resulting in performance issues and reduced productivity.

 

To solve for these issues, many organizations are considering replacing traditional WANs with software defined WAN (SD-WAN) solutions. While traditional WAN infrastructure is hardware-defined on individual devices, SD-WAN solutions allow organizations to set policies in one centralized location and push them out to all devices on a network. A centralized virtual controller defines how traffic on the network is routed.

SD-WAN offers considerable benefits to organizations attempting to manage complex data networking requirements. In this blog, we’ll explore five big reasons your organization should consider making the switch to SD-WAN.

 

SD-WAN Improves Network Performance

One of the biggest benefits of implementing SD-WAN is drastically improved network performance. Different types of traffic respond differently to network performance. Voice and video data, often referred to as real time data, can become choppy if the network is too bogged down. Realtime data requires reliable connections.

With an SD-WAN solution, policies are predefined and centrally located. Instead of configuring policies individually on branch equipment, they’re set in one central location and pushed out to branch controllers. An SD-WAN solution allows your organization to automatically steer traffic based on network conditions to identify more reliable and efficient routes for high performance traffic.

Solve Network Complexity Issues with SD-WAN

Traditional WAN systems were not designed to do what they’re tasked with in most organizations today. As our needs have evolved, these systems have become increasingly large, complex, and difficult to manage with multiple layers of connectivity. Policies must be defined and configured individually for every single branch link.  If an organizational security change occurs, policies also must be updated on each of those branch links.

SD-WAN solutions drastically simplify WAN management. The centralized controller serves as a single pane of glass, or portal, into the performance of the entire network. All policies are managed from a central location and pushed down to branch equipment. Traffic can be easily monitored and rerouted. Troubleshooting also becomes significantly easier. Instead of needing to physically check individual pieces of equipment when issues arise, SD-WAN gives your team an understanding of the network from one portal, without needing to get on edge devices.

Automation and Zero-Touch Provisioning to Improve Efficiency

Before SD-WAN, deploying connectivity to branch sites required a lot of manual upfront configurations. For many IT teams, that meant a lot of employee hours provisioning routers and going on site to complete device configuration. If you need to deploy a configuration change at sixty different sites with a traditional WAN solution, that means you need to touch every site to deploy it.

Most SD-WAN solution offerings have self-provisioning baked in. As a result, configuration is pulled from the central controller and branch equipment doesn’t require as much individual configuration. Devices can be plugged in at branch locations with no configuration, and the device automatically checks in with the network and is configured accordingly. Setting up a branch location, which used to take days from a network perspective, can often be done in about 20 minutes with an SD-WAN solution.

Reduce the Costs of Your WAN Configuration

WAN usage always comes with a price tag. The greater the requirements for reliability and security, the higher the cost. Most organizations with a traditional WAN solution use a private MPLS connection, which offers a great deal of reliability and security. But it can also come at a significant expense.

SD-WAN solutions often reduce the cost required for a WAN configuration. Instead of depending on high-cost connections like MPLS circuits, SD-WAN can utilize affordable broadband public internet circuits to build a reliable and secure connection. If you’re located in an area without access to reliable internet connectivity, an MPLS connection may not even be an option. SD-WAN opens organizations like yours up to alternative connectivity options.

SD-WAN Delivers Flexibility and High Availability

Traditional WAN networks can only route traffic through a single connection. If you were receiving a telecommunications connection from one internet provider, and they had issues, you had issues too.

An SD-WAN solution can actively use and integrate a wide variety of connections and multiple forms of traffic into the WAN infrastructure. If you want to continue to utilize your MPLS connection for specific types of traffic, for instance, you can. You can also integrate connections from multiple telecommunications companies. Utilizing multiple connections, you can set policies for which networks specific data types use. Traffic can be directed based on policies, or circuits can be integrated to serve strictly as a backup. Additional connections can easily scale to your organization’s pool of SD-WAN resources.

If versatility and a consistent, reliable connection matter, SD-WAN can help you achieve it.

Applied Technologies Can Help

There are a wide variety of SD-WAN solutions, ranging from simple to complex, depending on your unique circumstances and needs. Applied Technologies works with clients to identify, configure, and implement a tailored SD-WAN solution to help your organization get the most from the benefits outlined in this article.

In addition, we offer training to help your staff manage the network with limited third-party involvement. Traditionally if your team didn’t have the expertise to do configurations, you needed to bring someone in to make them. While we’re still available to support you when needed, with the appropriate training a SD-WAN solution will allow you to bring more expertise in house.

When you’re ready to realize the benefits outlined in this blog, make Applied Technologies your first call. Our team will work with you directly to understand the complexities of your network requirements and implement an SD-WAN solution suited specifically to your needs.

 

Is it Time to Upgrade Your School’s Security System?

Verkada School Security

 

Over the past two decades, there’s been an evolution in the role of school district technology directors and their teams. School technology teams today find themselves responsible for installing and maintaining systems and software, managing complex networks, and performing help desk duties.

 

As the Internet of Things (IoT) has become a standard in schools, IT teams are now managing an even broader set of responsibilities like network-connected HVAC systems and security systems. 

 

Unfortunately, staff and budgets haven’t necessarily grown at the same rate as the responsibilities of the school’s technology team. As a result, teams are trying to identify solutions to help them do more with fewer people. One area where they’re looking to gain efficiency is in school security. In this article, we’ll detail the four signs it’s time to upgrade your school’s video security system and talk through how Applied Technologies and our solutions partner Verkada can help you free up time and budget for other activities. 

“We’re working closely with thousands of school districts to not only deliver a video security solution that is making campuses safer, but one that also solves for additional non-safety related challenges educational leaders face,” shared Jeff Chase, Product Marketing at Verkada.

Sign 1:
The School Security System Can’t Do Its Job Without IT Intervention

When there’s an incident in one of the schools in your district, and someone needs to access video footage, what does that look like for your team? If you’re like many of the technology directors we talk to, it requires someone sifting through hours of footage to identify the incident. Once you do find the footage you need, there are additional complications getting it into a useful medium, and very rigid requirements for which devices it can be viewed on. 

If the above scenario sounds all too familiar, it’s a sure sign that you’re due for an upgrade that will eliminate the need for you and your team to play the role of middleman between principals and vice principals, and their security cameras. One of the biggest benefits of Verkada’s cloud-based video security solution is that it allows end users to get to the footage they need on their own, from any connected device, and find that footage in seconds. Users can be trained on the mobile app in a matter of minutes, freeing up your team for other high priority tasks.  

Sign 2:
Your Security System is Depleting Bandwidth District-Wide

A major problem we see with traditional school video security systems is bandwidth. In many districts, video flows to one central server hub at the district office. That means large video files are flowing through each school’s network and then onto a fiber connection between each school and the district. The result, as you’ve likely experienced, is a depleted bandwidth district-wide.   

You need a video security system in your schools, but you can’t slow down everything else in the name of security. The cloud-based nature of Verkada’s school security systems removes large video files from your local network, opening up bandwidth and ensuring smooth operation throughout your district.  

Sign 3:
Making Changes to the System is a Difficult and Time-Consuming Process

Imagine there is an issue of theft at one of your schools, in an area where there are no video cameras installed. The principal calls with a request to move a camera to provide visibility for the area where the theft is taking place. How complicated of a process would that be with your existing school security system? If it’s like many of the systems in place in school districts across the country, there’s no such thing as a “quick change.”

Verkada’s solutions allow cameras to quickly and easily be relocated if a need arises. As long as there’s an available ethernet port, a camera can be uninstalled from one location and reinstalled in another in less than ten minutes. 

Sign 4:
There’s No Clear Ownership of Security Budget  

Who owns the budget for your district’s shared video security solution today? If you have multiple schools sharing the same hard drive to store video data, who is responsible for repairs, upgrades, and add-ons? Too often, shared IT teams are expected to shoulder that bill. Your team likely doesn’t have time to change the hard drives, let alone money set aside to pay for them. 

Verkada’s solution removes the need for expensive video storage, allowing technology directors to centrally manage the system, while allocating costs specifically to the schools for the equipment they’re using. Principals in each school have a direct relationship with the video security system, and IT can be completely removed from the financial responsibility discussion when spending decisions are made.     

There Is a Better Way to Manage Your School’s Video Security System

Applied Technologies has a better approach to installing and managing your school security needs. We partner with Verkada to implement cloud-based school video security solutions and eliminate the need for dedicated servers and bogged down networks. They put access to footage directly in the hands of the principals and vice principals who need it, from any device, using a simple and easy-to-operate app. 

“We are excited to be partnered with the experts at Applied Technologies to help IT teams at schools better manage their physical security systems,” says Rob Marwanga, Head of Partner Marketing at Verkada. 

If you’re ready to optimize the performance of your school security system and free up time, money, and bandwidth, contact us at 314-274-8000 or sales@appliedtech.pro to start the conversation.  

Photo: Provided by Verkada 

Strategic Network Design: When Good Enough isn’t Good Enough Anymore

Network

 

In most manufacturing facilities, there is a point person everyone turns to for their shop floor network needs. When a new device needs to be plugged in, a change needs to be made, or a problem is encountered, they rely on their de facto architect and keeper of the Frankenstein Network. For the purposes of this article, let’s call him Tom.

 

Tom possesses a mental catalog of the devices included, what has been added over the years, and what not to do when it comes to the network. When a snafu occurs, he’s likely to know how to untangle it in the moment. Tom has overseen the growth of the network over the years, and has supported business requirements as new devices and systems have been added. Tom’s a great guy, and everyone on the shop floor has come to rely on him over the years for issues related to their operational technology (OT).

Although Tom has great deal of knowledge about the inner workings of the shop floor network and knows all the reasons why the environment is the way it is, Tom may be the first to tell you that while he has a handle on the operation of the network today, there really isn’t an overarching, top-down strategy for designing, managing, ensuring the security, integrating OT and IT, and scaling the network into the future. And by the way, Tom is scheduled to retire in less than two years, taking all of his network knowledge away with him.

This is a scenario that we at Applied Technologies see playing out in manufacturing facilities every day. Many of these companies are looking to seek a more strategic approach, to have a deliberate design for their network for better management and scalability to help bridge the gap between IT and OT which can allow organizations to reach their goals. Companies looking for a strategic network design are the companies that will be the industry leaders of tomorrow.

 

The Journey to Strategic Network Design

It may seem like an overwhelming task, but the Applied Technologies team employs an organized and systematic process to pick you up wherever you are in your journey. The most successful implementations involve the following steps:

1. Alignment across the organization

There is a common belief that the shop floor network is strictly an engineering and operations technology department function. You select the devices and programs that will keep your plant floor operations running.

Today companies, have recognized that both their operational and informational technology teams can play a critical role in reaching key business goals. It’s a top-down approach in which leadership establishes the objectives, assembles a team to develop the right strategies, and rallies the organization around the achievement of these objectives. In essence, it’s a big culture shift which aligns functions, such as OT and IT, which traditionally are held in separate silos. When leadership conveys the vision and successfully builds these alliances to leverage the valuable data that exists on the shop floor with the top floor, the results can be quite powerful.

2. The Network Assessment

To know where you’re going, you must first know where you are (and embrace the idea of starting where you are). Applied Technologies makes this possible through the Network Assessment. Through this process, you’ll learn the actual, real-time state of your shop floor network:

  • A catalogue of all devices on your network
  • Various software running
  • A basic analysis of your network traffic
  • A topology of how the network is currently, setup and configured
  • A list of low, medium, and high problem areas
  • Existing segmentation, if any

In most cases, the person in charge of the network is surprised to learn everything that he or she didn’t realize is occurring on the network. There may be unknown devices, outdated pieces of software, and even a great deal more traffic than originally anticipated. Regardless, the assessment gives us a baseline to begin identifying a plan for the future – starting exactly where you are and phasing it in as budgets and plant capacity allows.  It’s the stepping stone to ultimately achieving Manufacturing 2.0 or IoT.

3. The Security Assessment

Every business is a target for a security breach, and manufacturing facilities are no different. Any breach can cause a disruption in operations, and some can spell disaster for the company involved. Furthermore, a manufacturing company can find itself at greater risk due to the Frankenstein network. This ad hoc network approach can create a wide range of vulnerabilities and exposure.  It can be as simple as outdated software versions or unintentional access points in the network design or architecture.  Other challenges can quickly arise when there is no cohesive plan for the network.

A Security Assessment from Applied Technologies follows a two-pronged approach:

  • The Diagnostic Assessment… we’ll plug a special diagnostic apparatus into your system to identify issues and specify which components may be in need of attention. This helps us get a quick snapshot, with hard, real-time data, of the status of your network function and vulnerabilities.
  • Analysis… we’ll dig deep to fact find, learn about your goals and concerns, examine your workflow, and develop a comprehensive report to calculate your risk score, present the vulnerabilities that exist by area and device, highlight deviations from industry standards on network accessibility, and more. Our reports are customized for each Applied Technologies client.

The final report serves as a blueprint for implementation of security measures that will help protect against a breach and integrate seamlessly into your overall network design and strategy.

4. Strategic Network Design Plan

It’s typically not realistic to overhaul an entire shop floor network at once. That’s why the Applied Technologies team creates a plan that will prioritize the various areas of your network and build them into manageable segments, until we’ve covered all the ground.

  • Segmentation: As we examine the shop floor and all of the processes that make up the operations, we can begin to identify where walls must be constructed within the network. Segmentation is driven by processes, so a picture emerges that allows us to see which areas should be addressed first versus which are more long-term endeavors.
  • Organization: Applied Technologies follows a defined process for organizing the network, labeling the various connections and components so that it’s easy to identify which process, which line, or even which building each piece lives in.
  • Deployment: One-by-one, and based on the plan we’ve developed, the migration of devices from the existing, flat network to a newly created and segmented environment will begin.
  • Network Topology/Blueprint: Applied Technologies will develop a new network topology of how everything should be connected based on findings from the assessment phase
  • Deployment Process: Applied will work to develop a phased approach on the best way to start implementing the new network topology.
  • Management: Because everything that exists on the network is organized and well documented, managing and troubleshooting the network becomes simplified and much more efficient. When there is a problem, it’s isolated to its appropriate segment, so you know exactly where to find it. In this environment, impact to other areas of the plant if something goes wrong (or if there is a security breach) is minimized. When a new device or connection needs to be added, there is a process in place to identify it and document the change.

 

The Impact of Strategic Network Design

Once we roll out the first segment, the effects are quickly felt. That portion of the shop floor network runs smoothly, like a well-tuned car on a freshly paved highway. You probably didn’t really notice the chugs in the engine or the ruts on the road that developed over time. But once they’re gone, it’s a completely different experience. It leaves you anxious to pave the next stretch so that you can continue your journey in a better place.

But that better place isn’t just for your comfort and convenience. That better place is what will facilitate the achievement of your company’s goals through efficiency and the harnessing of valuable data from the shop floor. This is where your industry’s leaders of tomorrow are operating, and you can too.

Applied Technologies is ready to help you begin your journey. Get better insight into your shop floor network. Create a more efficient, organized and secure network environment. Be a leader in your space. For more information, please call us at 314-274-8000 or contact us at sales@appliedtech.pro.

 

Propel Your Business into the Future with a Network Assessment from Applied Technologies

 

The Frankenstein Network

 

Most of us are familiar with the story of Dr. Frankenstein, a determined young chemist who brings a creature to life that’s not quite what he intended to create. While his intentions were good, the ultimate reality of his creation brought a host of unintended consequences.

 

At Applied Technologies, we’re often reminded of Dr. Frankenstein and his creation when we examine plant floor networks.

 

The Current State of The Plant Floor Network

Building a plant floor network and adding components along the way isn’t quite as straightforward as it may seem. Like Dr. Frankenstein, those on the plant floor know all of the fundamentals and have a pretty good grasp on the various switches and components that are plugged in. However, there is a lot going on behind the scenes that isn’t immediately obvious to those who are in charge of managing the system. These things can impact the operation of the network in other areas and result in unexpected situations. In fact, when we plug in to get a handle on the traffic moving through the plant floor network, it’s often astonishing. Most don’t have a full understanding of how much traffic is moving at any one given time, or a full inventory of everything they’re dealing with.

What causes this high volume of traffic? We’ve found that most industrial networks have been built in a flat, open manner with components plugged in over a span of decades as additional functionality is required. Everything is running on the same highway, and all machines can see every other machine on the network. It’s a situation that isn’t necessarily “broken” – like Dr. Frankenstein’s creation, it can “walk and talk” – but it sure does leave the door open for problems. Think of the 1,000-plus devices that are plugged into your network. When left to play in the same space, they not only can cause unintended consequences for other devices on your network, they can open up security issues that you may not be aware of.

If this sounds like your plant floor network, you’re not alone. And if you’re inclined to think that this isn’t applicable to your network (everything is working, so it’s fine!), you may be surprised to learn what’s happening behind the scenes. In fact, an ad-hoc, “Frankenstein” network is the norm in most situations. The Applied Technologies team has worked with industrial clients for more than 30 years to build and maintain organized, efficient networks. The process begins with a comprehensive Network Assessment.

 

When You Should Start to Consider a Network Assessment

Companies understand the need for more efficient design and management of their networks. They are looking for greater efficiency, increased security, and the ability to leverage data to progress towards their overall business objectives. The Frankenstein network doesn’t work for them. It won’t drive them to the future or allow them to excel in a competitive environment.

Many customers begin thinking about the health of their network at key points of their existence. Perhaps they have a new device or switch that needs to be plugged in. Maybe there is a piece of software or hardware that’s due for an upgrade.  Regardless, in most cases, they don’t have a strategic plan or full picture of the network. Some know this, and others don’t. We’ve found that there are four predominant mindsets in the management of plant floor networks:

  • The unaware … these are the folks that live in bliss. Their network is working, so everything must be OK.
  • The confident … those who believe they know exactly what is happening in their network, and what will happen when that next device is plugged in.
  • The worriers … they know something catastrophic will happen one day, and they’re anticipating the pain that they’ll go through when it does. They pray every time a new device is plugged in that nothing will go wrong.
  • The duct tape masters … they’ve become the experts of putting in a little patch here and there to keep things running. In most cases, duct tape masters have been around for a long time, and no one really knows where all their patches are. Which may be OK today, but when they retire or leave the company, they take that knowledge with them.

The Network Assessment from Applied Technologies is the primary step in pulling back the curtain on your plant floor network. Through this process, we can show the unaware and the confident all the things they may not know. We give comfort to the worriers and identify all the patches made by the duct tape masters over the years. Our goal is to help our customers build their networks so they can be efficient, productive, and excel in their industries.

 

The Network Assessment covers the following areas:

  • Network traffic analysis
  • Inventory of all devices, switches and hardware installed on the system
  • Security assessment to identify vulnerabilities
  • Network stability
  • Recommendations for network segmentation

With the insights delivered through the Network Assessment, you’ll be able to make informed decisions about how to scale your network moving forward, how to get the greatest level of efficiency, stability and security, and how you can begin to leverage smart manufacturing in your business.

Every company can benefit from a Network Assessment.  It really doesn’t matter your company size, number of years in business or your industry.  No company is immune to problems if they don’t have a well-designed and documented network.

Don’t wait until something breaks to assess your network. Contact Applied Technologies today at 636.274.8000 or sales@appliedtech.pro, and start seeing the benefits of moving away from a Frankenstein network. Once you uncover the possibilities, you’ll experience a great, worry-free ride.

NetApp HCI Meets Public Clouds to Simplify Storage and Processing

 

In order to compete in today’s business environment, companies strive to identify ways to simplify processes to create efficiencies and speed up their go-to-market time.  While there are many process and technology enhancements that can contribute, there is a fundamental way that organizations of all types and sizes can change the way they approach their IT infrastructure – that solution is hyper-converged infrastructure (HCI), taken to the next level with NetApp Hybrid Cloud Infrastructure (HCI).

 

NetApp HCI is a revolutionary way to manage data and applications leveraging an on-premise cloud environment. NetApp HCI has changed the traditional model of hybrid cloud storage and made it possible for a company to have a system that combines on-premise and cloud functionality in the three major public Clouds.  It serves as the fabric that holds all of the pieces of your overall architecture together, allowing for seamless movement of data and workflows from one to the next, and back again.

 

How is NetApp HCI fundamentally different?

A NetApp HCI can scale compute and storage independently. Users now have the power to run applications and maintain efficient storage space needed for the workloads. Previous HCI architectures combined those capabilities, which consumed valuable resources both from an infrastructure perspective and a financial one. The traditional architecture was clumsy; NetApp HCI streamlines infrastructure solutions and makes application environment options simpler and more efficient.

A user can mix and match different storage nodes without making any changes at the compute layer and vice versa. This is incredibly powerful when it comes to expanding storage capacity or compute resources one node at a time. NetApp HCI was developed for large enterprises, so it can be scaled in a large corporate scenario, but it is accessible enough to be easily and efficiently deployed in smaller organizations and even the Edge. This makes NetApp HCI an agile technology that any industry can benefit from regardless of size or scope while achieving enterprise-grade levels of resources, performance, and protection.

Why utilize NetApp HCI?

Any corporation facing a new technology development or looking to expand their storage or computing capabilities can benefit from NetApp’s hybrid cloud architecture:

  • Speed … the system provides the highway for information to move more quickly through your organization. This means that your internal and external customers have the data and services they need more readily available as there is a smooth conduit in place to facilitate on-premise and cloud communication – regardless of what cloud your data and workflow reside in. NetApp HCI delivers an elastic hybrid cloud infrastructure that enables customers to start anywhere, run anywhere, and manage everywhere from Edge, to Core, to Cloud.
  • Scale-on-Demand … need more storage space but not more processing power, or vice versa? You can quickly scale your system, on your terms, to meet your specific needs. Due to the modular nature of the system and included automation, it is quick and easy to add or reallocate what you need as your requirements change ultimately reducing TCO.
  • Security … you can have the best of both worlds with a cloud-operational environment located on-premise, maintaining a hybrid cloud, while still securing your applications with built-in security features such as multi-factor authentication, data at rest encryption, and FIPS 140-2 Level 1.
  • Control … there can be layers of complexity when it comes to fully managing your IT in the cloud. You can gain the control and governance you need with a NetApp HCI solution.
  • Flexibility … NetApp HCI is multi-cloud and supports multiple hybrid-cloud solutions such as those from VMware, Google, and RedHat delivering an agile foundation for your private and hybrid cloud infrastructure.
  • Guaranteed Performance … in a traditional environment, you may find processes competing for resources at the same time, in different areas of your production workflow. The NetApp architecture allows you the visibility into these resource demands in order to allocate them for maximum speed and efficiency while guaranteeing performance for all of your applications through three-dimensional QoS capabilities.

 

How is NetApp HCI Implemented?

Discovery & Goal Setting: The discovery process begins with a meeting to determine your company’s overall objectives and the storage and compute needs that will be required to achieve those objectives. The goal of this process is to gain an understanding of the resource requirements needed in the environment. The team leverages assessment tools to gain a thorough picture of what is already running in the environment, what modifications may be in order, and what the key objectives from leadership may be. This might include striving for a reduction in complexity or cost, or a move to a new environment for example.

Easy Implementation: The time needed to implement is dependent on how large the cluster is, but in general it is a streamlined and consolidated process depending on the following factors:

  • If a customer already has VMware in the environment and the network is determined to be in appropriate working order, HCI can attach to an existing vCenter, so it can shift to the new infrastructure with VMotion.
  • The only migration required is moving the VMs to the new hardware, which is done through VMware’s typical mechanisms.
  • If there is no VMware present, the process entails more planning in order to implement.
  • After implementation, if you need more compute or storage, you may easily add either (or both if needed) through the NetApp Deployment Engine. The beauty of the system is that you can scale independently, using the new available nodes which are easy to absorb into the cluster.

Partner Collaboration: Partnerships are key in ensuring the success of NetApp implementations. NetApp Partners, such as Applied Technologies, hold the valuable experience and intimate knowledge of each customer’s needs, goals, and challenges. These insights allow for the creation of a comprehensive technology plan that can include the NetApp HCI solution working in concert with other hardware and software platforms for maximum performance and advancement towards the customer’s goals.

NetApp HCI’s innovative design combines the best methods for managing data and applications. You no longer need to pay for extra storage or compute you don’t need while still benefiting from an enterprise-grade infrastructure with guaranteed performance. The bottom line is, NetApp HCI creates more flexibility, eliminates complexity, and drives costs down while accelerating new services for faster time to market speeds.  As a preferred NetApp partner, Applied Technologies will help you understand how your company can leverage the system which is scalable, delivers the speed you need, and allows for the security and control you’re looking for.

To begin the conversation contact us at sales@appliedtech.pro or call 636.274.8000 to discuss your business requirements with one of our Account Managers or Practice Leaders.

Helping Customers Adapt to a Remote Workforce Environment

Working Remote

 

Applied Technologies is available and ready to help your organization support business continuity during these challenging and unprecedented times.

 

As many companies move to a remote workforce environment, in response to social distancing guidelines and requirements, it is important for employers to keep remote workers secure, connected and productive.

 

While Coronavirus (COVID-19) remains a threat, our top priorities remain the satisfaction and support of our customers, as well as the health and wellbeing of the people who work for, and partner with, Applied Technologies. We have taken several precautions for our employees to stay healthy, productive and available to support you and your organization by delivering technologies that address both your current and future business challenges. In fact, most of our employees are equipped with the same technologies we provide our customers – which allows our team members to work remotely and provide you with continuous service and support.

Applied Technologies experts are available to help you navigate these increased demands in networking, collaboration, storage (cloud and hybrid-cloud) and security.

We are prepared to support you and ensure we keep business strong for our communities and country. We remain confident in our ability to respond to these new technology challenges.

Please contact us at 314.736.0500 or sales@appliedtech.pro with any questions or to discuss any immediate technology needs.

Make Your Smart Manufacturing Initiatives Even Smarter

Assessments

 

 

 

 

 

 

 

 

 

Selecting the right partner for your Network Services is a crucial choice.

 

Without one, your manufacturing network can become the sticking point for the rest of your business, leaving the IT and OT sides of your network poorly connected and your network open to threats. It’s not just a matter of finding an IT company, especially now that so much of the shop floor now have cloud-based technology.  It’s about finding a partner that can help you operate more efficiently and impact the bottom line.

 

A partner should be able to integrate your enterprise and plant floor networks seamlessly, provide the remote access users need, and protect your company against security breaches.  At Applied Technologies, we have a team of industry-certified professionals to find the best and most cost-effective solution for you.

 

Finding the Right Solution

Applied Technologies’ Network Services start with facility and security assessments. We offer several assessment options to identify areas that may expose your business or have an impact on your processes. These options include security, access (network), and structured cabling assessments.  After we review both IT and OT infrastructure, we provide our analysis with a high-level summary so you can effectively prioritize the most important first steps.

Security

Security assessments are particularly important. As the possibility of cybercrime continues to increase, security attacks are inevitable. However, with the right security services, a network breach doesn’t have to be. We partner with you to ensure we understand your policies, practices, and processes as we design solutions to keep your business secure. Our security options include:

  • Compliance: Includes Payment card industry (PCI), International Standards Organization (ISO), and more
  • Assessments: Includes IT risk assessment, penetration testing, social engineering, and threat analysis
  • Information Technology: Includes next-generation firewall (NGFW), advanced malware protection, and email
  • Incident Response: Includes detection, testing and training, digital forensics, and more

Visit the Applied Technologies website for a complete list of our security options.

Remote Access

Every network is different, as is the level of remote or mobile access your users may need. What remains consistent is the importance of keeping that remote access safe and reliable. We have extensive experience in both designing and implementing core and edge devices, as well as the cable plant design needed to support them.

Structured Cabling

Assessing the physical set up of your network is just as important as assessing how the network could be compromised and attacked. The Applied Technologies team works with manufacturers to plan, implement, and manage structured cabling solutions, including assisting with developing requests for RFPs. Whether it’s third-party testing, finding the right contractor resources, wireless network design, or power protect, Applied Technologies will be with you every step of the way.

Are you ready to get started with network services to make your manufacturing network safer and more efficient? Contact us today to get started and find the best solutions for your company.

Network Security and Your Medical Cannabis Facility

Medical Cannabis

 

If you’re starting a medical cannabis business, you may be swamped with various considerations. “Where should it be located?”, “What staff will I need?” or “How will I set up the facility” are all important questions best answered by those with experience.

 

When considering network and physical security and your ability to meet and/or exceed compliance requirements, Applied Technologies offers a complete solution for your operation. We have the technology integration solutions and team of certified professionals to ensure you are secure, competitive, and can make informed business decisions.

 

Medical cannabis facilities can be various sizes and configurations depending on the company. They include a greenhouse for growing the seeds, and a manufacturing facility for processing the product. Each will want to protect not only their operations, but their proprietary intellectual property that provides a competitive advantage in the marketplace. Companies also of course will include a dispensary or retail storefront, where patients can buy medical cannabis. While the stigma around cannabis is being addressed on the side of the patients, it’s also important to address it on the manufacturing side, and how best to produce medical cannabis.

Manufacturers will need a doctor’s letter of recommendation to apply for a state medical card, but keep in mind that regulations and HIIPA requirements may change as medical cannabis becomes more mainstream. Sellers will need to collect some identifiable patient information, and state and local governments are still settling on what the best regulations for security will be moving forward.

These will connect back to the state, so that is an open portal that must be considered from a cyber security perspective. Depending on the compliance rules decided on, that security may be audited on a yearly basis. Not only will you need a strong firewall on Security Information Management (SIM) monitoring and IT staff, you’ll need to routinely check in with employees and educate them to ensure the human-run side of your business data is protected from threats like phishing.

Medical cannabis facilities are not necessarily more susceptible to network breaches, but it’s important to remember that hackers are not interested in if you’re compliant or not. In addition, simply being compliant may not be a high enough level of security to protect your facility.

Technology Compliance

 

How does Applied Technologies help?

You may be new to the medical cannabis industry; many are. Even small computer issues could be enough to shut down your facility, so it’s important to ensure you have someone on your side with experience and proven solutions. At Applied Technologies, we have staff that are experienced not just in physical and network security, but also in cannabis growing and compliance regulations.

New rules are being released regularly, so it’s important to have a partner who can read them and interpret what they will mean for updating security measures.

Applied Technology Setup and Management

Applied Technology helps you map out a complete digital security and network solution, including both physical and cyber security. Our design experience will ensure your environment is secure and that you can run your business uninterrupted. Applied Technologies will:

  • Assess the floor plan
  • Review facility goals
  • Identify the plant capacity for the facility
  • Identify security camera placement
  • Set apart network storage areas
  • Ensure IT and infrastructure are included in the budget
  • Check compliance regulations

When becoming licensed, remember there are a limited number available, and you’ll need to accept your license within 48 hours of receiving your email. State compliance officers will be working with facilities across the state to enforce the rules, approximately four times the number of officers as those covering all bars and liquor establishments. While it’s still a business like most others, ensuring compliance regulations are met is essential, and being proactive is the best way to stay compliant. It’s also important to remember that even with a well-secured network, it can be breached due to human error managing it, so employee education is critical as well.

During initial planning for your facility, keep in mind that you’ll either need staffing or consulting for physical and database SQL concerns, which is a six-figure salary. One of the most common mistakes we see new cannabis businesses make is not budgeting enough for the set-up and management of their network infrastructure and security. Many simply don’t know the depth and complexity of what’s required, and the level of expertise needed to manage it all.

High speed internet is also necessary for one of these facilities, so keep that in mind when considering a location. It’s tempting to pick a rural location for the space and lower priced real estate, but it’s not always an ideal choice when it comes to internet connectivity. Be sure to check on whether this type of infrastructure is available in the location you’re considering, or budget appropriately so that you have an alternate plan in place.

A partnership with Applied Technologies will help manage your facility and build a team to make your facility succeed. Learn more about how we can support you at www.appliedtech.pro/grow or contact Krista Salvatore, Director of Sales at ksalvatore@appliedtech.pro or 314.736.0500 for more information or to discuss a technology assessment.

Going Beyond Video Security with Bosch

Bosch

 

The importance of video security cannot be understated in the current technology landscape. That’s why Applied Technologies has partnered with Bosch to not only help companies meet their security requirements, but to go beyond video security to increase ROI and improve efficiencies.

 

Why physical security is important

When it comes to network security, are you also considering your physical security? Video systems, intrusion alarms, and access control systems are all key pieces of a network security plan. Having the right products and systems in place ensure your business remains safe from physical threats as well as network threats. Bosch provides award-winning technology that goes above and beyond the highest security demands of today to ensure you are prepared for whatever comes next. Bosch systems support a high-level of encryption, cloud-based services for monitoring and configuring devices, and secure networks and protocols.

However, security cameras equipped with built-in Video Analytics can be used for more than surveillance and liability reasons. Minimizing crime is a benefit of security cameras, but now they can also be used to maximize efficiency.

Beyond security

The average video security system simply records, and only 10% of that video data is ever used. The vast majority of what’s recorded loses its value the moment it is generated. Bosch offers cameras that are more than devices for capturing video images.

Bosch’s intelligent technologies for video security allow you to make use of data for better efficiencies and opportunities. The cameras feature built-in Video Analytics to enable them to analyze scenes for reasons that go far beyond security and deliver smart data to help businesses improve safety, increase efficiencies, and reduce costs.

Examples of the advanced analytics capabilities include:

  • Intelligent Tracking of objects in motion
  • People counting
  • Detection of health and safety risks, like blocked emergency exits
  • Video-based fire detection
  • Geolocation
  • Tamper detection
  • Queue detection
  • And more!

 

 

 

 

 

Let’s take a real-world example of a grocery store before a snowstorm. If there’s only one person at a register, they won’t be able to keep up with the long lines. However, the POS system will only show there was a steady stream of customers, not that customers had to wait in long lines to checkout. Bosch cameras can detect the number of people standing in line to alert store managers that another cash register needs to open. They can also count the number of people entering and exiting the store to help you determine peak days and times when you’ll need more staff to improve service and generate even more revenue.

Cameras offer so much more than security now. The goal is to reach 100% utilization of the cameras for security and beyond.

Bosch engages in day-to-day business with you to ensure that you can get the most out of your system. Their camera systems also integrate with their mass notification systems, which make it ideal for an emergency like a fire.

We’re proud to partner with Bosch because of the value they contribute to businesses and society as a whole. If you’d like to learn more about what might be the right product for you, reach out to us today!