Jeff Loughridge


Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

The IT Law of Holes: Stop Digging and Start the Technology Migration

IT leaders make investment decisions based on which technologies are positioned to support the business. They're faced with decreasing per-unit capex/opex costs and increasing requirements for bandwidth and computing resources. Older technologies yield to newer versions that are faster, more flexible and easier to use. But how do you know when it's time for a technology migration?

This may sound familiar: Your business relies on a 15-year-old networking technology. A newer version or a functional replacement has been available for five years. The older version is beginning to show its age in its ability to meet technology and business requirements. You find yourself in a situation in which:

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

  1. Engineers who understand the technology are more difficult to find, and thus more expensive.
  2. Support costs are rising as the vendor focuses on newer technologies.
  3. Network hardware is approaching end-of-life status.
  4. The technology barely meets today's performance/throughput requirements.
  5. Internal support costs are rising.

I've worked with clients who see that the legacy networking technology should be ushered out. While they may recognize the problem, the dollars required to fund a transition effort are removed from the budget year after year. Why? The pain may not yet be acute, and other items in the budget may appear much more pressing. However, the delay means that once the migration does take place, it will be more costly and complex.

These companies may not have internal staff members who can make the case for migrating from older technology. The complexity of the technology migration effort may be so daunting that no one is willing to risk his upward mobility to advocate it, lest it exceed the budget and miss the targeted completion date.

In many cases, my advice to clients follows a networking law that I call the Law of Holes: When you're in a hole, stop digging. Sounds simple, right?

My law is based on a cap-and-grow strategy: Cap your spending on the old technology. Invest in the technology that represents the future. When an abrupt stop in spending isn't possible, severely restrict it, preferably backed by a mandate that any spending on the legacy technology must be approved by the CIO. This signals to the organization that leadership stands behind the technology migration effort and sees its success as crucial.

Next: The Cap-and-Grow Philosophy


Page:  1 | 2  | Next Page »


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers