DataTap Solutions

Category Archives:DevOps

Cognitive Analytics

If your IT environment is like 90% of the other complex environments out there, chances are that you are dealing with lots of data (structured & unstructured) and limited resources (Tools & Personnel). Powerful technologies exist and are being improved that automate analytics and decision making. Among the technologies driving IT automation are machine learning, neural networks, deep learning, natural language processes, and more. These technologies have statistical roots and are mainly constructed around analytics.

analyticsEras

 

Cognitive Analytics add a flavor of automation in the form of processing adhoc data streamed from multiple sources. These Analytics have the power to characterize any type of information embedded in the data and put them to use in real-time. Some of the examples include, automatic issue remediation by conducting pro-active diagnostics, adaptive communication frameworks such as BOTS, etc…

 

DataTap’s solution is capable of collecting data from multiple data sources, learn and characterize the entities, correlate and isolate anomalies, prescript the insights into various processes and measure the effectiveness of the prescriptions. This level of automation enables your IT teams to handle the onslaught of data volumes and keep the costs low.

 

Please visit other DataTap blogs that explain how each of these solutions work. If you need more information on our products and services, please contact us at contactus@datatapsolutions.com.

Infrastructure Performance Management

Application Performance Management (APM) solutions have helped IT teams considerably in cleaning up issues in running applications efficiently. With the cloud and virtual infrastructure adoption, focus now drifting towards Infrastructure Performance Management (IPM) and Digital Performance Management (DPM) solutions as issues span beyond the applications.  IPM & DPM have been at the forefront of several large operations teams with distributed infrastructure for years. These include retailers, services firms and financial firms. Branching IT operations to a remote location with limited branch IT expertise calls for consolidated IPM/DPM solution that offers visibility into a diversified set of digital assets.

FullCircle

DataTapSolutions helps IT teams with branch operations achieve,
  • Enhanced business effectiveness by reducing downtime, improving application performance, and reducing the cost of IT services
  • Improved infrastructure operational efficiency, reduce operational costs and decrease time to remediation
  • A more cost-effective IT infrastructure that better aligns IT capacity and performance with the needs of the business
  • End-to-end, real-time performance views of the entire infrastructure

NFV, Cloud IMS – Assurance Strategy

As your network architecture evolves and migrates into a public or/and private cloud environment, voice network requires more TLC. Unlike other IP applications, VoIP/IMS applications require consistent timing for flaw-less operation. With the uncertain compute characteristics that cloud brings-in, your vIMS service assurance becomes a priority.

voip-4-cloud

CHALLENGE
Adoption of cloud based call control services is very cost effective. However services like Cloud IMS, lead to service quality and reliability issues as a result of the following:
  • Cloud resource sharing
  • Unpredictable bandwidth availability
  • Coexistence of applications
IMPACT 
vIMS is seen as the first level of Virtualized Network Function (VNF). Failure to deploy vIMS correctly poses a risk to NFV adoption, effecting future marketing and sales initiatives.
DESIRED SOLUTION
DataTap’s capture & aggregation capabilities in all major cloud providers help you with faster resolution times during deployment or service initiation. Continuous monitoring of network, log and event information provides valuable insights and robust service assurance:
  • Cloud and On-Prem support
  • VoIP Quality analysis
  • Application Detection & Correlation

DataCenter Operators: Key Concerns and Top Priorities

Recent survey of Datacenter operations managers revealed that Security and System Performance are the top two challenges in the fast growing data traffic environment.

datacenter-top10-challenges (1)

Understanding datacenter operations goes long ways into addressing these challenges. Check out our products and services designed for Datacenter operations. Our solutions give a single pane of glass to address multiple challenges like security, operations analytics, SLAs along with basic monitoring capabilities like application performance management, traffic patterns, SLAs, etc…

 

Troubleshoot Call Quality Issues in IMS / VoIP

If you are troubleshooting call quality issues, you must agree that the time is of essence. You need tools that give you more than a bar graph or a pie chart. You need a solution that tells you a story. A story that lays out the critical data points collected from multiple sources over a period of time, defining the context for you.

voip-2-story

CHALLENGE
Dropped calls, choppy calls, loss of dial tone and voice delay are the typical problems your customers experience as a result of your network issues. Following are some typical contributing factors:
  • Jitter, Packet Loss and Latency
  • Network misconfigurations
  • Issues with Interconnection provider network
IMPACT 
Consistent poor voice quality increases customer churn rate directly impacting the revenues and service reputation. Voice quality issues increase support call volumes forcing service providers to realign resources from other productive tasks.
DESIRED SOLUTION
Granular visibility to critical voice traffic attributes in realtime helps in effective root cause analysis (RCA). Proactive monitoring and troubleshooting of issues reduce the impact of poor voice quality. You need a voice quality measurement solution that includes:
  • Real-time measurement of Media KPIs, such as RTP Jitter, Packet loss
  • Correlation of Voice traffic attributes with other network attributes
  • SIP/RTP Timing Analysis on origination & termination networks

International Telecom Week (ITW) 2015


itw2015

Looking forward to seeing you all. We help you with managing SLAs, Oversubscriptions and resource optimization with our solutions. Come see us at ITW2015 Booth 1620.


 

Rocket-vs-Docker

docker-vs-rocket

You must be wondering why Rocket is being introduced so vehemently into the market. Well the makers of Rocket (CoreOS) are also a Docker contributors. The philosophical difference of opinion on what a Container should be is what propelled CoreOs team to introduce Rocket. Here are the advantages of both the solutions at a high level.
Docker:
  • Growing to be more than a Container technology with its Cluster API, that “enables” advanced Orchestration capabilities.
  • Fits into the Telco NFV model by standardizing the packaging and orchestration functions of Containers that are analogous to ‘Virtual Network Functions’
  • Ideal for Hybrid IT environments because of it’s increasing integration capabilities with AWS, etc…
Rocket:
  • Promise to stick with ‘App Container’ specification helps certain organizations that need flexibility and control of managing a container.
  • Preserving the sanctity of Container Security as the demand grows in Container space is certainly a challenging task. I personally think Docker is not an ideal implementation from a security aspect.
  • New entrant on the block attraction index of Rocket is certainly going to help CoreOS bank on the momentum. The zeal to right the wrongs of Docker implementation will benefit the adopters in the areas like Networking, Security, etc…

vns-dtap


 

Cloud visibility solution with fortified security

Cloud environments often fall short in terms of networking flexibility. Most cloud environments are starting to offer virtual cloud packages to address this shortfall. Traditional mid-to-large businesses require unique networking features with added layers of security on top. To address these problems Cohesive Networks introduced an All-in-one solution called VNS3 few years ago that fulfills your need for a VPN, Gateway, Firewall, Switch and Router.
Now to address the visibility into very secure, network rich Cloud environment that Cohesive offers, DataTap has ported dProbe to run inside a VNS3 instance. This allows VNS3 users to get complete visibility of their Cloud infrastructure.
Following are the three basic advantages of DataTap Cloud Visibility solution:
  • Application Performance Management (traffic visibility & latency analysis) with agent-less architecture
  • Advanced Threat detection & log correlation in a dynamic cloud computing model
  • Seem-less integration with on-premises service monitoring with Hybrid-IT deployment support

Take a look at how your cloud instances in multiple cloud vendors can leverage VNS and SightApps to achieve Cloud visibility.

vns-dtap


 

 

 

Cloud-Security-Model

Security is the one word that makes people stop and think for a minute on the impact of their actions. With the uncertainty that cloud imposes on where the resources and data are hosted makes cloud security a hot topic. I really like the cloud security model put together by Mark Nunnikhoven, where the shared responsibility of cloud provider (facilities, physical infrastructure, network infrastructure, virtualization layer) and hosted entities (the operating system, any applications, data) described. However, I am not able to come to grips with the concept of ‘The Wall’ and the proposal that individual VMs in the enterprise cloud environment should employ security controls, instead of all of environment itself. Please read –

The irony of the public cloud is that while compute and storage resources are available in abundance, bandwidth is typically scarce. All of the traditional methods of deploying these controls are bandwidth intensive.

 

Successful security in the cloud moves these same controls to the virtual machine. We move from single, large security controls that protect the entire data centre to controls deployed directly on the virtual machine and responsible for only that virtual machine. This allow the use of much smaller rule sets since the control now has the context in which it’s running.

 

Think of it this way: the traditional method is to have the city guard check everyone at the gate. The guard has to know the business of everyone in the city and then validate whether or not the folks at the gate have a valid reason for being there. By moving that check to the door of the business someone is visiting, it makes it a lot easier for the guard at the door to do more in-depth checks. The guard at the door only has to keep track of the one business, not the entire city.

The problem with this approach is now the intruders are not watched for until they hit on a door of a business (individual VMs). I feel the analogy is some what not relevant here. There are so many security checks that are common among an enterprise cloud VMs, a centralized security analytics platform is not only helpful but a must have to find the breach before it finds you.
You can read the complete cloud security model article by Mark here.