telanova Blog

telanova: the outsourced IT team that feels like your own

Providing advice, consultancy, helpdesk, monitoring and maintenance, updates, upgrades, security: all the things your in-house team would do, but better and at a fraction of the cost and hassle.

How much downtime is acceptable ?

System 36 - 30Mb Hard drive

Many years ago, once a year, in a production factory that ran 24/7, everything would come to a halt for the Test. While the Test was in progress all orders were stopped, people hung around like they were waiting for the starting gun of a race.

Deep inside a locked room people would be busy dismantling and inserting a loan hard drive into the System 36 and then the big restore from 12 inch disks in magazines, 1st the monthly back up, then the weekly back up, then the daily back up. After many hours and copious cups of coffee and boxes of biscuits, the system would be sent live to see whether everything had worked successfully. The downtime was costly, and that was thankfully without any live customers trying to connect online to see the status of their order.

Fast forward to just a few years ago, and replication was the in thing. Some companies built whole triplicates of their server rooms, with a duplicate site only a few miles away, ready for raiding for parts, and another site a few hundred miles away ready for major disasters. Testing the fail-overs resulted in many issues of lost orders, lost data as people didn’t realise they were entering data onto the temporary fail-over test systems.

Fast forward to a few of years ago, Enterprise companies were migrating to the cloud, aware of the cost, but knowing of the saving of having a system that would be always on and able to expand and reduce as the demand suited, backups are still required but testing of those can be done in a separate cloud area without disrupting the main business.

Fast forward to today, and the costs have lowered, and now every business Small and Medium can enjoy the cloud benefits. Whether it is full in the cloud servers through Azure, or using Cloud services such as Office 365 and G-Suite.

What comes next is open to debate, but the server-less architecture looks to be a fair bet, which will see that server you built dynamically grow or shrink depending on how busy and how much work it is doing. So you won’t be paying for power you’re not using, and you will be saving the environment.

Stick with us and we’ll keep you up to date

#telanovaReporter

PS. Don't forget to try out our downtime cost calculator

10 Reasons to Fly to the Cloud

You’ve been told that everyone is moving to the cloud. Now before you start booking plane tickets to see where they are, let’s take a look at some reasons why you might want to consider more cloud activity in the near future.

Collaborate

When you’re working in the cloud, the whole team have the same information at the same time, and many tools will allow live collaboration regardless of physical location.

DDos attacks against QKD networks could be mitigated with SDN

Communication at the speed of a photon

The Latest Technology in Secure Communications is Quantum Key Distribution (QKD) , these rely on single photons traveling between points via an optical channel. Detection of eavesdropping on QKD networks is possible based on the fundamental constraints of quantum mechanics.

However, you may not be able to listen in to QKD traffic, but malicious people can exert a Distributed Denial of Service (DDos) attack. As a QKD detects any disturbance, the key generation between the two points is disrupted and has to be re-established. Naturally DDos can continue to disrupt the communications.

Thanks to collaborative research by the teams at the High Performance Networks group, the Centre for Quantum Photonics at University of Bristol, and British Telecom Research and Innovation they have published their findings on this issue. ( Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN) Feb 2018 )

Using a Software Defined Network (SDN) application to handle the situation, the SDN was able to monitor the breakdown in communications (key generation) and then automatically selects a different route for the traffic away from the DDoS.

It’s good to see that before technology has become widespread, the research has begun on how malicious attacks might take place and how to protect against them.


#telanovaReporter

Code Smells, a rise to maturity

The smell of Orchids

Today’s world is full of an increasing amount of program code. Back in 1999 Martin Fowler[1] defined the basis of Code Smells. Smells, being the inherent way humans in nature detect bad, and good things, likewise, Code has a smell, be it bad or good. A bad code smell being code that contains bad programming techniques, duplicate code, ie. poor quality. A new paper called Code Smells, by Peter Kokol, Milan Zorman, Bojan Žlahtič, Grega Žlahtič [2] , has been published.

Kokol’s paper[2] analysed the rise of discussion around code smells. Using bibliometrics to analyse research papers which contain references to code smells, Kokol was able to map and detect the changes in frequency and geographical distribution of papers.

Their results highlighted 337 publications which contained references and of those 70% were related to conference proceedings. Which they concluded may mean that code smells is still in the rising state of maturity.

They plotted the details on a timeline and identified that the largest rises were in 2009, then in 2014. They also identified which countries were using the term the most, and as might be expected USA was top, with almost twice the next country, Italy. Italy contained the individual institution that had produced the most papers, with 19 papers published by the Universita degli Studi di Milano.

The research papers indicated that code smell research was split into 3 themes, smell detection, software refactoring, development & anti-patterns. Of these themes code software development and anti-patterns, was the most popular themes, using anti-patterns and knowledge of software development problems code quality can be increased.

Overall an interesting and highlighting paper that shows that in the future, machine learning, and other analysis tools may be used against software development code to identify if it smells of sulphur or wild orchids.

[1] M. Fowler, Refactoring: Improving the Design of Existing Code., Reading: Addison - Wesley, 1999.

[2] Peter Kokol, Code Smells, 2018

#telanovaReporter

Looking to test the quality of your IT configuration, talk to our consultants about what changes you can make to get that wild orchid smell :

Call telanova on 01344 567990

Does Google really give you the answers you want ?

Google Search

Many of us have been there, you want to book a hotel, you have a rough idea of where, when, how much to spend etc. You enter a search, and 4 hours later you are still trying to find a booking that matches what you need. Every additional search shows more and more possibilities without giving you the ideal answer.

A recent study shows that the current methods of search and discovery are ending up meeting only around 51% of our functional properties, and when it comes to quality and price it can be as low as 16% satisfaction.

The recent paper by Messaoud WB at the Universite de la Manouba, ran a study using traditional and a version of Behavioural Web Service Discovery (B-WSD) (B-WSD Approach and Validation: Use Satisfaction Survey Nov 2017). Looking at the different areas of needs of a consumer and surveying how satisfied the consumer was after the selection was made in each area, including Functional Properties, Non-Functional, Execution cost, Quality/Price, Waiting time.

In conclusion the way searching is performed now, with the explosion of data on the internet, is not always meeting our needs. Using B-WSD, a sequence of operations of a web service, leads to a translation of the the consumers needs, and once the problem is analysed B-WSD approach proposes the modelling of a discovery system allowing a search to be developed according to customer data.


#telanovaReporter

Email Facebook Google LinkedIn Twitter

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand