Microsoft Outlook Support

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Sunday, 23 August 2009

“VirtualiSation and the Other Green Computing Initiative”

Posted on 08:51 by Unknown
By Owen Cole, Technical Director UK&I, F5

Green IT within organisations has to be an initiative that results in positive bottom line impact, or it is doomed to failure as a strategy. Reducing power consumption and management expenses, as well as increasing efficiency of resources through consolidation and virtualisation is an effective route to lessening the impact on the environment as well as improving profitability. This article examines the technologies that can be used to achieve both these aims.

There’s been a lot of hype over the past year surrounding “green” computing and the drive to lower the impact of IT and data centres on the environment. While we’re all for the concept of green computing and reducing the impact of computing on our environment, we’re also cognizant of the reality that every IT organization also has to worry about the other kind of green: its bottom line.

The good news is that there is some amount of overlap between these green computing initiatives. Reducing power consumption and management expenses, and increasing efficiency of existing resources through consolidation and virtualization decreases both the impact of devices on the environment as well as on IT’s increasingly tightening budget.

Reducing Power and Heat
The easiest way to reduce the impact of any device on the bottom line, be it a server or networking equipment, is to reduce the amount of power it requires. Modern servers often draw variable amounts of power based on the processing power in use by applications. Similarly, some networking equipment and other devices provide the same functionality, drawing varying amounts of power based on their load and configuration. This can be beneficial in reducing the operating cost of the server or device, but like dealing with variable costs of bandwidth due to bursts in usage, also makes it difficult to estimate annual costs and budget appropriately.

Another simple, but often overlooked, facet is how many BTUs are generated by any given device. By decreasing the BTUs generated, there is less heat and thus less cooling required within the data centre. The costs of cooling a data centre are larger than those to heat one, owing to the fact that much of the heating needs in a data centre are inherently taken care of by the BTUs generatd by the devices it houses. Reducing these costs can have a significant impact on the operating expenses of any IT organization.

Reducing power consumption and generation of BTUs for devices and servers is something over which IT has no control. While IT can certainly use such ratings as part of its decision making process for purchasing, it really can’t do a thing to affect how much power is consumed or how many BTUs are generated by any given device. It’s simply a cost of doing business.

Yet IT can make decisions, both in purchasing and architecture, which reduce power consumption and heat generation by reducing the number of servers and devices that make up its data centre. Consolidation and virtualization are both ways in which IT can positively impact its bottom line.

The Impact of Consolidation
Consolidation has been an ‘initiative’ in IT for many years, and it generally revolves around the consolidation of the data centre in terms of the number of servers deployed to support mission-critical applications. While reducing the number of servers in the data centre, and thus rack density, both power consumption and heat generation can be positively affected.

Yet capacity needs must be balanced with consolidation efforts, and at some point consolidation is no longer possible. As the volume of users and application usage grows, so must the number of servers – and devices such as application delivery controllers – necessary to scale mission-critical applications.

Striking a balance between scalability and controlling costs is difficult, and thus far it has been nearly impossible to avoid the deployment of additional application delivery controllers as a mechanism for scaling out a data centre. Whether chassis or appliance-based, these devices have only added to the cost of power consumption and increased the generation of heat within the data centre, raising operational costs.

Solving this problem requires effort on both the part of the application delivery controller vendor to reduce the power consumption and BTU generation of devices while simultaneously providing a way to scale without increasing the number of devices required for deployment within the data centre. A single, chassis-based application delivery controller requiring less power and generating fewer BTUs that also scales via a virtualized bladed architecture can address the growing need for capacity without adversely impacting IT’s bottom line, or the environment.

The Impact of Virtualization
By architecting a new breed of chassis-based application delivery controllers that take advantage of virtualization not only at the server level but at the chassis and blade level, these new devices can provide better performance in a single unit than could previously be obtained with multiple appliance-based solutions or legacy chassis-models.

By virtualizing blades and CPUs, essentially creating a single, powerful processing matrix, this new breed of chassis-based application delivery controller can scale nearly linearly. This internal processing scalability means that every last drop of processing power is being used and can provide a much higher capacity than its legacy ancestors. By more efficiently using the processing power available, the performance per power unit is increased, making each transaction processed by the application delivery controller cost a fraction in terms of power consumption than would otherwise be possible.

Consider the comparison in Figure 1. Regardless of what the cost per kilowatt hour, there is a significant savings in terms of power when moving from the legacy chassis-model to a new, virtualized chassis-model. This has a significant positive impact on the environment as well as on the organizational budget. Given the higher performance capacity of the new chassis model, this also allows for fewer devices necessary to meet the growing traffic management and application delivery needs of today’s IT organizations, which lowers the cost of operations as well as management.

The management costs of such a new breed of application delivery controller are inherently lower than a traditional application delivery solution, owing to its virtualized architecture and the ability for the device – and IT manager – to manage the system as a single entity rather than as individual blades in a larger system. This reduces the amount of management necessary, and in turn reduces the costs associated with managing the device. This is especially true as capacity is added, as it would require multiple legacy chassis-based devices to match the processing power of a single virtualized chassis-based system. Each added device must be managed, and adds to the amount of power consumed and BTUs generated, making it much more expensive to scale.

Also having an impact are the BTUs generated by each device. There is a definitive cost associated with removing the heat generated by these devices in the form of cooling, so the lower BTU generation of the new breed of chassis-based solution is a definite boon both on the environment as well as on the budget.

Conclusion
It’s rare that an environmental friendly movement such as Green IT results in reducing costs, especially in its early stages. And yet in the case of this new breed of chassis-based application delivery controllers, that’s exactly the result. With the decreased management and power consumption costs and increased performance, these new application delivery controllers are both green as in grass and green as in cash.

F5 is exhibiting at Storage Expo, 14th – 15th October, Olympia, London www.storage-expo.com. The UK’s definitive event for data storage, information and content management provides the opportunity to compare the most comprehensive range of solutions and services from leading suppliers with a free and unrivalled education programme.

Courtesy: Eskenzi PR/Storage PR
<>
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • DDoS-Attacks disable many shopping websites, including Amazon
    Just in time for last minute Christmas shopping major shopping sites disabled by Michael Smith (Veshengro) London, December 26, 2009: An...
  • Open Source Software in Business & Government
    by Michael Smith (Veshengro) Lots of Open Source in use in mainland Europe, including EU member states, very little in the UK and less still...
  • Cyber-Ark Expands RSA Secured Partner Program Certification Status
    Cyber-Ark Privileged Identity Management Suite, Inter-Business Vault and Sensitive Document Vault Now Formally Interoperable with RSA enVisi...
  • Infosecurity Adviser applauds forensics lab training facilities at key UK university
    London, UK. May 2009: Infosecurity Adviser, Infosecurity Europe’s online community for the information security industry, has published a r...
  • Scientific company discusses simultaneously protecting applications and data
    Simultaneously protecting applications and data: The next evolution in security? September 2009 (Eskenzi PR) – In a recent Imperva podcast...
  • TUFIN TECHNOLOGIES WINS the PRESTIGIOUS 2010 Computing Security Award for ‘Best bench tested solution of the Year’
    Network Computing and Computing Security Magazine Editors Select Tufin’s SecureChange Workflow as the Top Product Reviewed in 2010 Londo...
  • Brocade Service Could Help Reduce Billions in Data Centre Operations Costs
    New Energy Efficiency Review provides holistic assessment and remedial strategies to help companies optimise efficiency and reduce costs Ene...
  • Infosecurity Europe 2011 Hall of Fame nominations now open
    London UK, February  2011 – The time is ripe to elevate the greatest movers and shakers in the world of information security as nominations ...
  • Tufin survey reveals the truth about fudging audits, IT cost cutting and buying equipment online
    Ramat Gan, Israel – May 27, 2009 – Tufin Technologies today announced the results of its “Reality Bytes” security survey. The survey parti...
  • ISACA’s EuroCACS Conference Demystifies the Cloud
    Event for IT Professionals Will Take Place 20-23 March, Manchester London, England, (8 th March 2011)— Global business and information ...

Categories

  • ASUS
  • AVG Link Scanner
  • BeCrypt
  • book review
  • Brocade
  • Codenomicon
  • Columbian USB stick loss
  • computer recycling
  • Conficker worm
  • Credant Technologies
  • cyber crime
  • Cyber-Ark
  • Cyber-Ark®
  • Data Center
  • data encryption
  • DeviceLock
  • Digital Pathways
  • diskGenie
  • Eclypt
  • Eee PC
  • Eee PC Seashell 1008HA
  • F5 Networks
  • Facebook
  • Finjan
  • Finjan Inc.
  • Finjan MCRC
  • Firewall Management
  • Fortify
  • Fortify 360
  • Fortify Software
  • Fortify® Software
  • gadgets
  • Google
  • Google Chrome
  • green computing
  • green IT
  • IBM
  • Infosec
  • Infosec Europe 2009
  • Infosecurity Adviser
  • Infosecurity Europe
  • Infosecurity Europe 2009
  • Internet privacy
  • iStorage
  • iStorage diskGenie
  • iStorage Ltd.
  • Juniper Networks
  • Lakeland
  • Lapdesk
  • LLC
  • Logitech
  • malware
  • ManageEngine
  • McAfee International Ltd
  • MI6
  • MI6 data loss
  • Microsoft
  • MiFi™ 2352
  • Mio
  • Mobile Broadband
  • MS Office
  • National Cybersecurity Advisor
  • Navman
  • Navman Spirit
  • Netac
  • Novatel
  • Novatel Wireless Intelligent Mobile Hotspot 2352
  • OneClick IntelliPanel Desktop
  • online social media
  • open source
  • OpenOffice.org
  • Optenet
  • Origin Data Locker
  • Origin Storage
  • PNDs
  • product review
  • Red
  • SaaS
  • Sat Nav
  • saving energy
  • Security
  • Shavlik Technologies
  • SIS
  • spam
  • Stonewood Group
  • Storage Area Networks
  • Storage Expo
  • Storage Expo 2009
  • Sun Microsystems
  • Swine Flu
  • Syphan Technologies
  • Throwing Sheep in the Boardroom
  • Tufin Technologies
  • Twitter
  • U256
  • Unisys Security Index
  • USB drives
  • Vektor
  • VisionRacer
  • VisionRacer VR3
  • VMware
  • Weast
  • Web Apps Security
  • WebFilter PC Solution
  • WebSpy
  • XSS-driven attacks

Blog Archive

  • ►  2012 (1)
    • ►  January (1)
  • ►  2011 (67)
    • ►  December (1)
    • ►  April (1)
    • ►  March (14)
    • ►  February (30)
    • ►  January (21)
  • ►  2010 (192)
    • ►  December (20)
    • ►  November (22)
    • ►  October (19)
    • ►  September (5)
    • ►  August (8)
    • ►  July (5)
    • ►  June (22)
    • ►  May (13)
    • ►  April (11)
    • ►  March (13)
    • ►  February (27)
    • ►  January (27)
  • ▼  2009 (240)
    • ►  December (25)
    • ►  November (9)
    • ►  October (21)
    • ►  September (19)
    • ▼  August (30)
      • Leona Lewis music hack may be publicity stunt
      • US Court Grants Finjan a Permanent Injunction for ...
      • Swisscom IT cuts time spent on firewall management...
      • Amazon cloud evangelist to give Storage Expo openi...
      • Crown Plaza Venice hotel booking fiasco could have...
      • Fowlers Revs Up With Numara Track-It!
      • Twitter security move positive but is it it enough?
      • Stolen Lincoln playgroup laptop highlights danger ...
      • Mobile laptop usage soaring - but what about compa...
      • Security players form alliance to tackle malware
      • 1.7 million reasons for local authorities to use p...
      • “VirtualiSation and the Other Green Computing Init...
      • Cross site scripting (XSS) flaws hit the Ministry ...
      • Britney Spears hack highlights reputational risk o...
      • CREDANT Technologies extends data protection to Ma...
      • Compliance does not guarantee security
      • Staff&Line Partners with ProServ
      • Microsoft announces Office 2010 web applications
      • Weak cloud password security highlights strength o...
      • Peru makes a big statement about reusing rather th...
      • FSA £3m fine on HSBC could easily have been avoided
      • Twitter down again - another attack?
      • Pro-Georgian blogger was the target of Internet at...
      • Finjan Prevents Zero-Day Exploit of Adobe Acrobat ...
      • Microsoft and Yahoo cooperate on Search
      • DESlock+ Achieves ‘Five Star’ Accolade
      • Instant message dangers are growing
      • Google promises end to viruses - Fortify says: don...
      • Criminals could capture data from wireless keyboards
      • Loyal Employees or Snooping Staff? You Decide
    • ►  July (35)
    • ►  June (30)
    • ►  May (21)
    • ►  April (42)
    • ►  March (8)
Powered by Blogger.

About Me

Unknown
View my complete profile