by Craig

Project completed - UK Floating Homes goes live!

Been working on this for a while now and am very pleased to have this website up and running.

UK Floating Homes is everything about the world of house boats and living on the water.

They do everything in the process from planning and mooring evaluations to the build and commissioning of your floating home. Which looks very interesting and, having been on one to take photographs, is actually a very nice environment in which to live (no cars!!!).

Check it out though as its a pretty polished site and all the photos are my work as well! :)

by Craig

Bring your own device!

Sounds a bit like “pick your own” doesn’t it? It’s not a dissimilar concept really. You pick your own strawberries (or other) because the farmer saves money/time by not doing it for you and an IT department can save money/time by not buying you a piece of equipment for you to work on. Or does it?

There are lots of things to weigh up here and it will depend on your organisation’s strategy before you can really get into whether “BYO” is for you or not. Some of it is actually an internal conversation which could be forced on IT by the business, for their own reasons, or it might be something that is put in strategically by IT to reduce costs. Anyway let’s look at some of the points.

Bring your own device is kinda cool

I like it! No really I do. The idea that you can bring whatever piece of IT gear you like to work on brings further the idea that you are just a contractor selling your time to a company. It allows you to work the way you want, a little bit, without making you conform to a certain piece of equipment.

This is really a good thing if you are travelling, developing, presenting, marketing or whatever else it is you do that means you need a piece of equipment that suites your style. You can go out and get the tool that is right for your job.

Plus if you like the shiniest toys you can go off and buy it under the excuse that you need it for work. Macbook air anyone?

You can’t expect IT to help with the device

Macbook Air

A MacBook Air, what I would quite like for my next works laptop

Not only is it “bring your own device” but it is also “bring your own support” meaning that you could go off to Apple/Dell/IBM and pick up a device as well as the support for it. You would also be expected to know how to configure said device to work with company systems or troubleshoot it when it doesn’t. If not then you will need to rely on the support you purchased along with the piece of IT equipment. Of course the IT department would give you all the correct configurations for your device and these may include your device, or they may not….

The upside for this in the IT department is that you don’t really have to support end users building them new systems and getting things to work. A single, standard, document on how to set something up is pretty much it and if you want something else then you need to make it work! If this doesn’t work for a particular individual then IT could also to supply a laptop as a company and be paid for it. This would be a laptop of their choice and would cost the appropriate amount but would already be set-up.

IT need to present everything as a service

It’s all very well bringing your own device to work but IT need to respond in a way that makes services into consumables with none of the smoke and mirrors that you sometimes get. As such each service that is produced by IT would need to be documented and available (presumably on an intranet) for the end user to install and consume. I would anticipate the legacy applications being deployed using Citrix as a delivery mechanism but there are other’s that certainly would not be; email for example.

A developer might demand the latest Alienware PC![/caption] What’s great about this is that a new user doesn’t have to wait for a piece of company equipment to appear before they can start productive work. The environment is set-up and working all that an end user requires is a logon and the ability to read some manuals.

This, of course, leads the way into Virtual Desktop where you actually work on a server hosting your desktop rather than your local machine. This could be useful in certain situations (such as call centres) but it would depend on your situation rather than being a general good idea.  

Virtual Desktops - the quick paragraph

This is a big big subject which I wont go into right here in detail but there is an option to totally host a desktop for an end user. To the end user it would appear as if something were “taking over their machine” when they login to it but in actuality it is a presentation veneer filling their entire screen. This desktop is actually running, virtually, on a server within the company’s data centre controlled and monitored by IT. These desktops can be cloned, reset, deployed, updated and generally managed on mass by IT in it’s data centre. If you are thinking “yay this is great” you might want to do some more research, it’s an option but there are many things to consider and it would be remiss of me not to mention it.

IT would retreat and “protect the core”

Essentially this is saying that anything outside of your core network is untrusted. So for every office you have and for every user that is connecting in via VPN you are actually treating them as if they were from the internet. VPN and the like encrypts traffic between a user and the edge firewall but does not guarantee that the user is on a trusted machine. Similarly if a user brings in a machine from home and plugs it into your corporate network you have very little chance of knowing if it’s secure without some very expensive edge devices watching your network. The BYO device would mean anyone could plug anything, deliberately or otherwise, in into your network from Malware, Virus’, DDoS tools and Trojans to actual hacking tools attempting to discover information held within your servers. As such there needs to be an access control device (firewall) between your core server/services and any network edge such as an office or a remote user. I would think that this firewall would be configured to only allow access to known resources and deny others, for instance:

  • Access to file sharing on the file server but nowhere else
  • Access to remote desktop on development servers but nowhere else
  • Access to SMTP/POP/IMAP on the exchange server but no other ports
  • No access to SQL ports anywhere
  • etc etc.

That’s obviously not an exhaustive list and would require some time to set up all the various combinations whilst ensuring that too much is not allowed through. It isn’t any easy tasks which is why most organisations don’t do this unless they are truly large and can afford them time and effort required.

Where this could be a good idea and where it isn’t so much

The final word on this is where this would really shine and where, maybe, you might want to think twice. Establishments that are more or less fixed with little opportunity for growth such as utilities, governmental offices or anywhere that there is a long established company with a static set then leave this alone. If you are in a company which is expanding rapidly or a higher education facility or anywhere with a changing user base then this might be a good idea. For my part I was involved in a rapidly expanding company with a rather small IT department. This sort of solution would allow any new company instant access to corporate systems without the worries of core security. Budgets would also not have to be completely redrawn with new user requirements each time as they would just be an increment on a central licence count rather than a bespoke piece of hardware. Of course there is a huge investment in the core of the network but it only has to be done once.

Final thought

This might seem like a really bad idea to you or it might not do but there is no escaping the explosion in connected devices we have seen over the last few years. As IT professionals we have to adapt and change to accommodate our user base rather then sitting in our entrenched positions.  After all if we don’t change and adapt then another service provider will step into the gap between us and our users and provide them with word, excel, calendars and email…..

by Craig

Working out what storage to use with virtualisation

This is a tricky one as, if like me, you were starting out with no real base lines to work with then it’s a bit “finger in the air” time. Of course no-one actually admits to doing that but ultimately it will cost you more in time and effort to get accurate metrics than it will be to have an educated guess. Even then (with either method) the chances are your business will have changed within the next year or so to consume whatever it is that you have deployed and make any initial metrics moot.

So it was with some interest that I stumbled upon a paper by Brad Bonn of VKernel (now part of Dell) which talks through some of the figures and numbers you will be hit by when talking to storage vendors.

What the paper does do is talk through the use of storage within virtualisation and give you some idea of what kind of thing you are going to want from a storage solution. It doesn’t say “BUY THIS”, even though they now work for Dell, which is a good thing as all situations are different. But it does give you a starting point of what to think about when making a storage decision.

In particular Brad talks about:

  • The fundamentals of storage and the types of storage you can buy
  • How the physical disk eventually ends up as a drive in a VM
  • Where problems can occur in SANs with overloading
  • The use of IOPs (Input/Output operations per second) as a measuring device

So rather than plagurise it I direct you to the site where you can download and read for yourself :)

Ins and Outs of IOPS by Brad Bonn - VKernel

by Craig

Resurrection of TrailsUnexpected and a new site

This is another shameless piece of cross-promotion and something that has taken me some hours to sort out!

TrailsUnexpected

Trails Unexpected is the travel site of Brian Coles who took him, and his now wife, on a bike trip from London to India. The blog existed on a rubbish piece of software called pivot which failed at any opportunity it had. There server it was on took such a dislike to it that the hard drive started to throw errors and eventually wouldn’t boot.

Unfortunately i hadn’t taken a full backup of the site in a while so had to get the disk sent back to me where I extracted the content from pivot and created a new wordpress site (http://www.trailsunexpected.com) moving other content to flickr and youtube to make it more integrated.

Anyway have a look as its interesting and the videos are pretty good!

Ross.YourIntranet.co.uk

In other news I have managed to tempted Ross to start writing a blog to get some of the random pieces of knowledge out of his head. Who knows what will happen as he has only managed one post so far :) But as the title suggests it’s at: http://ross.yourintranet.co.uk

by Craig

How Google and Facebook are tracking you on the internet. Do you care?

Ever wondered how Facebook manages to target those adverts at you when your logged in? How somehow there are adverts on websites that you have never been to for something that you were just looking at?

Facebook are about to roll out in-line adverts to their users moving away from the sidebars and into your newsfeed (source). The principal reason for this is obviously revenue, Facebook needs a lot of it to please it’s investors after their “interesting” stock launch (source).

So how do they actually know what you have visited? Well it’s actually quite straightforward but relies on setting up a environment that becomes self perpetuating; specifically the need for links to appear high in Google rankings.

We all want our articles or website in general to be viewed by many people and in order to do so we want to appear high up in the rankings on a Google search. Google, essentially, works out where to rank your website/page based on the number of external links to your website and therefore how “important” your website actually is. This grows a trend where you want to encourage people to link to your website to push up your rankings, and what’s an easy way of doing this? Sharing content on social media.

You have all seen buttons like this:
   

These are all over the internet with the idea of you reporting back to Facebook, Twitter, LinkedIn, Google+, DIG or whoever about how you like, or want to share, a particular page.

But these very things have two roles; they are an easy way for you to share your browsing experience of the internet (that really what you want?) and also tracks you as you go around the internet. How does it do this? Well actually its not that hard.

You would think that the two images above are actually stored on my website somewhere and are being served up to you, actually in this case they are but that’s not how it is meant to work. What is meant to happen is a webpage inside a webpage generates those images.

IFRAMES are an HTML coding term where an inline-frame is put within a webpage. This frame can take it’s source from where ever it chooses and will display exactly as if you had navigate to that page. To prove this point I have created an Iframe below and loaded Direct Gov’s home page:

 
<iframe src="https://www.direct.gov.uk" width="800px" height="300px"></iframe>

Now that is quite useful if you are taking a feed from another website and you can do things like lose the scrolling bars on the bottom and right hand side and make it much smaller, in fact you can make it to roughly the size of an image. Do you see where this is going?

So instead of loading those Facebook and Twitter images from my own server I am encouraged (or more) to use an IFrame to do so. This doesn’t sound particularly interesting until you realise that you are permanently logged onto Facebook and so the image is actually loaded from their servers with your login. The code used to generate the Iframe above for the Direct Gov’s Home Page is:

The code to generate the Facebook “Recommend” button on this page ( http://www.independent.co.uk/news/business/news/george-soros-is-facebooks-friend-for-106m-8050419.html) on the independent website is (wait for it):

<iframe id="f33789e70c" name="f3b8a3ddb4" scrolling="no" style="border: none; overflow: hidden;
height: 20px; width: 130px; " title="Like this content on Facebook." 
src="http://www.facebook.com/plugins/like.php?action=recommend&amp;api\_key=235586169789578&amp;
channel\_url=http%3A%2F%2Fstatic.ak.facebook.com%2Fconnect%2Fxd\_arbiter.php%3Fversion%3D9%23cb%
3Df33ef7dac%26origin%3Dhttp%253A%252F%252Fwww.independent.co.uk%252Ff81fa9e74%26domain%3D
www.independent.co.uk%26relation%3Dparent.parent&amp;extended\_social\_context=false&amp;
href=http%3A%2F%2Fwww.independent.co.uk%2Fnews%2Fbusiness%2Fnews%2F
george-soros-is-facebooks-friend-for-106m-8050419.html&amp;layout=button\_count&amp;
locale=en\_US&amp;node\_type=link&amp;sdk=joey&amp;show_faces=false&amp;width=130"></iframe>
KABOOM!

What the hell is going on in there? Well there are a few things and many are about display but one which I should point out. There is an “API_KEY=235586169789578” which is very likely to be a unique identifier for the Independent website. So, because you are still logged into facebook much the same as if you were visiting the site, Facebook now know you have visited the Independent newspaper website. There are also further values about where you are from and what you are looking at (the actual URL of the page is there) so they know exactly what page you have browsed to and could be sent ever more information should they want it.

That in itself is quite concerning but Google takes this up to another level.

Google Analytics allows you to track website visitors across your websites  by loading a HIDDEN Iframe onto every page. That’s right you don’t even know it’s being loaded (unless you look at the source of the webpage). This reports back to Google what you are looking at exactly so that not only do the owner’s of the website know exactly what you have looked at but Google now knows as well. They can then use your recent browsing history to serve you up targetted adverts.

As an example of this do please now visit the millet sports website and have a look some golf shotes. In fact let me load that page for you in an Iframe (below)

But now lets open a completely different website that uses google analytics to produce adverts in our case this is going to be “HOCKEY BUZZ” which is actually an ice hockey site so not entirely relevant to field hockey. Open http://www.hockeybuzz.com/ and scroll down on the right hand side - notice anything familiar?

All they have done there is take your browsing history on one website and turn it into an advertisement on another by reading your browsing history from their database. This might not bother you as it’s just advertising being targeted very effectively but it also means that someone has your browsing history which you might not be so happy about.

How do you stop this? Well firstly you can sign out of Facebook, Google and anything else your not using when away from their site. Secondly you could use the “Incognito” browsing capabilities of the Google chrome but that is like trusting one of the perpetrators so I wouldn’t rely on it. Lastly I would realise that you are probably always being tracked. The new European legislation to ensure that we accept cookies (hence all those wierd cookie statements you have been seeing on websites recently) was to stop this kind of tracking using cookies as a storage device, it does nothing to stop this sort of tracking.

Do you care? I am not sure on this one but it does concern me only as far as identity theft and what someone could do with the information of your browsing history (if anything)? But forewarned is forearmed…. PS. The great irony in this is that if you try and load Google’s homepage in an Iframe you can’t as Google’s homepage sends a “X-Frame-Options: SAMEORIGIN” response header. This means that only pages on the same domain can load the homepage as an Iframe…..

by Craig

Oracle Fundamentals - a little bit more

Since I wrote the last column on Oracle (What’s a database? And what is Oracle?) a number people have said to me that they actually found it useful! This is kind of the reason I write these things so I thought I might expand a bit further on what other things a database, and in particular Oracle, can do.

The previous column focused on storage and how databases like Oracle manage information to make it accessible to many users at once. Principally this is all you need a database to do and other products take care of other functions such as data manipulation.

Procedures & Functions

There could be cases, however, where you want data manipulation to be done within a database. For instance if you wanted to run an invoicing routine against your massive sales table you wouldn’t want to leave a client PC logged in running that routine you would want to start it off and walk away, or perhaps have it run automatically each night!

Many databases have the ability to run code for you within the database using, in Oracle’s case, either a function or a procedure. These two things are more or less the same with the only real difference being that one tells you how it did and the other doesn’t! In our example of invoicing a function could let you know it had finished and a procedure wouldn’t. Each have their place and it’s up to the programmer involved how they are implemented.

It is not that easy to explain why you might want to use a database procedure without an example so lets create a “pseudo-code” version and explain it’s use…

To generate invoices we could have to work out a number of factors before we actually bill someone. So in the case of a car rental it could be factors such as time rented, options taken, discounts applied, car rented. This could be something like:

Pseudo-Code:
1.Retrieve customer details from database
2.Retrieve car rentals from database
3.Retrieve discounts from database
4.Calculate the time elapsed from last invoice run
5.Generate invoice line from factors above
Each of those lines would be a command and not neccesarilly a simple one either! It could be prone to operator error or something more sinister. Instead of doing all this we wrap all this in a procedure:

Pseudo-Code:
Procedure RunInvoicing is
  1.Retrieve customer details from database
  2.Retrieve car rentals from database
  3.Retrieve discounts from database
  4.Calculate the time elapsed from last invoice run
  5.Generate invoice line from factors above
End Procedure

The procedure, having been defined, is then stored as code within the database. So now to run all of those commands we type into and Oracle sql session:

SQL: Exec RunInvoicing;

That executes the procedure we have already stored in the database and runs all the commands in it that generate our invoices. There are some important additions to this which are much more about business logic and privacy than they are about programming:

  • It is possible to restrict the viewing, editing and execution of a procedure to different logins increasing security and privacy
  • It is possible to encrypt a procedure so that no-one can read the code stored within
  • A procedure can be run internally by Oracle on a timer so it runs the same time every night if required (using DBMS_JOB)

A quick note on Packages; these are a collection of functions/procedures put inside a wrapper to make everyone’s administrative lives easier. It’s analogous to a having a car - yes there are lots of wires and switches under the hood but all you are shown is a steering wheel and some pedals a Package does the same and only shows you the steering wheel and pedals yet there are many procedures and functions that are actually running.

Triggers

You might not want to run a procedure or function each night and you might want something automatic to happen each time a specific buisness event happens. For instance you might want to send a welcome email to every new customer once their account is created. A Trigger on the customer table can be setup to “fire” each time a new customer is created calling a procedure or function which, in turn, emails the customer.

Triggers can be used to a variety of things from deletion, update or addition events. The database also protects against triggers that loop (call each other) and will let you know with a lovely error message :)

Views

A view is much like a shortcut in that it shortens a commonly used request to a similar term. If you worked in a company and the CEO wanted the whole company he or she might say “get me the finance department, the development department, the ground staff, reception, the motor pool and IT which is the whole company” (wierd company). You now know what compromises the entire company so if he or she says “get me the whole company” you know what departments to go a get. So in pseudo code we want to get all the Jill’s in the company:

Pseduo-SQL: select all the Jill's from the finance department, the development department, the ground staff, reception, the motor pool and IT

Which is dull, especially when you now need to run the same command for Alan, David, Brian and Samantha. So we create a view of that instead:

Pseduo-SQL: Create View AllCompany as select everyone  from the finance department, the development department, the ground staff, reception, the motor pool and IT

So now when we want all the Jill’s we can do:

Pseudo-SQL: Select all the Jill's from AllCompany

Much easier :)

The last word

Oracle has many MANY more functions than just this and they are adding new features all the time. These are some pretty basic functions that lots of other database products also incorporate and are extremely important for database programming. Some software houses like their products to be database agnostic but that removes the option to leverage some of the great functionality built into the database products.

When developing I made extensive use of functions and procedures to do simple things like check a login or apply a VAT calculation all of which can be a bit sensitive. Understanding what those things mean will make any conversation with a developer a lot easier to have and help you make good decisions.

by Craig

HandMadeOak - bespoke furniture

Shameless cross promotion with a bit of tech added in.

HandMadeOak is run by a friend of mine and creates bespoke Oak furniture for whatever you need.

This in itself isn’t that interesting but I have recently rebuilt his website (which I also host) and shows what you can do with Joomla given a little bit of time: www.handmadeoak.co.uk

For those of you that don’t know Joomla is a free content management system that runs on php/mysql with a plethora of options to make the site your own. I successfully introduced it to IDOX to run their Intranet and again for HandMadeOak and it works really well for both giving them the ability to change the content of the website without have to know anything about HTML.

by Craig

Still here! Here's what's been going on...

It’s been 119 days since my last post and OH how things have changed!

Firstly I have moved the website to a new web-host (TSOHosting) and I am much happier with both in performance and the features that the new hosting company provide. You may notice a difference in how quickly things load which will save countless seconds in our lives ;) Secondly, and perhaps more importantly, I quit my job! Which brought to a close 9 years working for IDOX Group the last 3 of which were as the Head of IT. My reasons for leaving are many but it felt like the right time both professionally and personally. I want to finish off that chapter of my working life with a synopsis of the lessons learned but I might save that for another time.

So since leaving IDOX (4th April) I have had a self imposed period of gardening leave. Most of that time has been spent with personal matters which I don’t wish to discuss here but it’s also prompted a moment of reflection which is never a bad thing. In between the times of watching the rain continuously fall and the country gear itself up for the Olympics I have bought a couple of pieces of tech which I think I should share.

Sonos

Many of us will already have some sort of stereo system either playing physical media (CDs etc) or streamed media from a storage device. I was looking at the rather large collection of CDs in our house and thought I must do something about it. The problem I have had to this point is that there isn’t very good integration between the components of a streaming system to make it easy for anyone to use, in particular people other than me!

The Sonos system (www.sonos.com) is not a cheap option and for many that will put people off from choosing this route and going more bespoke. That’s fine but one of my goals was accessibility for anyone to use which is why I chose it.

The system is made up of individual “Players” which are self contained units which connect wirelessly to a base station (they call it a “bridge”). These players can read a music source such as a network share and play whatever you want or play radio stations from the internet. Control of these units is either done through a dedicated remote or from a free app which you can download to your iphone/ipad etc. They all act independently so you could have different music playing in different rooms or all playing the same thing!

One of the great components of this system is the remote control which can be installed on your phone/tablet from which you can navigate through your music or a radio station and start playing it. There is no messing around with awkward displays or turning other things on (except for storage) you simply play the music you want which is excellent for my other half! :)

dBpoweramp - ripper

The next thing on this list is a piece of software enabling me to “Rip” a music CD such that a digital copy is made on a hard drive of a music CD which I can then play through the Sonos system. The idea here is that you make a share on your PC onto which you “Rip” the CD on your PC. You then point the Sonos system to this share and it reads the share and the CD copy you have just ripped there.  You can then put the CD somewhere else (read the loft for me) and never look at it again!!!

The problem in the past has been the quality of the ripping (read recording) of the CD and not knowing if it has skipped during the recording and only finding out much later when you are listening to it. Fortunately since I last looked at ripping technology it has moved on a bit and thus enter dBpoweramp (www.dbpoweramp.com).

There are only a few features which make this software an absolute must for me; the ability to rip to FLAC files, the online querying of music libraries and the use of hashing for file comparisons/quality. So to go through in a bit more detail:

FLAC files - when you Rip/Copy a CD to your hard drive the PC needs to use an algorithm to build the files onto your machine. As an example of these algorithms Itunes uses AAC and you must have heard of MP3 before! Both of these are compression algorithms that lose some of the information/quality of the song in order to save space. I didn’t want to lose quality so I used File Lossless Audio Codec (FLAC) to build my music library on my PC.

Online querying - Extremely useful to ensure that all the songs you are ripping have the right names and that you have the album artwork as a file next to all the songs. If you get all this right then when it plays on the Sonos system the track numbers will appear as well as the album artwork.

Hashing - Possibly the most incomprehensible bit of the system but it is all done automatically for you so it’s no big deal. When you do an online query for an album to bring back the artwork and track numbers dbpoweramp also looks in it’s own online database for the MD5 hash of the file created by the rip. This is essentially a finger print of the file which confirms what size the file should be and, therefore, the quality of it. This is a user produced database where each time someone rips a track it uploads the MD5 hash of the file and you can see how many other people have ripped this track and be confident that, if your MD5 hash matches everyone else’s, your rip is as good as it can be.

Given that I have around 900 albums to rip I found the speed and accuracy of this piece of software absolutely invaluable.

Synology NAS

The next component I needed was a NAS on which to store all these music files. The last thing I wanted was to turn on my PC each time someone wanted to play some music and I also wanted it to be as easy as possible for someone to turn on the music storage and see if the music storage was on.

After some investigation I decided to use a Synology NAS (www.synology.com) based on it’s feature set and some of my own research through friends/colleagues I know who use them.

[]Synology create a number of NAS products but I was particularly interested in the DS212+ which is a SOHO product (Single Office/Home Office) as they can be used for my particular purposes but also allowed me to look at the product for use in other projects.

Of particular interest for all of the Synology products is the DSM management software which the NAS runs. This is a web interface product with a kind of “plug-and-play” approach to software which you typically see with apple products. You download the particular function you want through a “Package Center” and it installs the code on your Synology NAS for you to use immediately.

The features that I was interested in, to name a few of those available, were:

  • virtually silent running (approx 20db)
  • “Cloud station” which allows you to back up one NAS to another (fantastic when you want to have a physically redundant backup)
  • VPN Server - I can connect to it from outside of my home network to access files when i am not at home
  • It being a NAS and serving files!

There is also a very obvious power button on the front which turns it on and off (properly)!

So with that setup my home music system was finished and ready to rock and roll - it sounds pretty good too :)

So with that little exercise I moved onto sorting out the garden as isn’t that what gardening leave is about? Oh and if you were wondering; yes my garden does look really nice now :)

by Craig

Kell Systems office server cabinets

I stumbled upon these guys a while ago in the adverts in the back of Computing Weekly magazine. They were all dressed up to look like an internal email about how someone had “discovered” this new system and how brilliant it all was. I took some notice, but not alot!

Scroll on a few years and we are removing all servers from offices and virtualising them to a central data centre. I should explore this in a longer post but, in short, we are left with a server room that contains very little more than structured cabling and switches.

Now this is the sort of space that would be good as a meeting room and, as we all know, meeting rooms are always in short supply yet we need somewhere to put the switches and ports; enter the office server cabinet.

I did some research into what Kell Systems claimed to be able to do and thought that it would easily be able to cope with the limited amount of equipment we were going to put into it. What I found was a very good product which I would happily put into any of our office environments and the rest of this blog is a mini-explore of that same product.

Quick overview

I would suggest watching the demo on YouTube as to what these things are and how they work (save me typing it out really)

Now the things I would say immediately is that the sound proofing really really does work. OK it’s not silent but it hugely reduces the amount of noise down to something like a printer ticking over in the corner. If you open the doors there is a significant change in the volume in any office you are working in so much so people stop and look!

What did we put in there?

As we moved all the servers from the office to the data centre we were left with the connectivity; switches, structured cabling and a single ESX server to run office services.

As you can see it’s mostly structure cabling, cisco switches, a UPS unit and a 2U Dell server making up most of the rack. I would say this would be a typical setup for an office of up to 100 people.

It does make everything nice and compact and there are good routes for cables coming out the back of the rack through a specially designed floor in the rack.


Sound reduction

As I said before this really has worked in our case and you have an idea of what we are actually putting in the rack (as above).

The acoustic matting is a thick foam substance which, more or less, is attached to every panel of the rack. It works pretty well and the drop in noise from shutting those front doors is remarkable!      


Air flow

We don’t run anything particularly hot so it’s difficult to gauge the effectiveness of the airflow with any degree of certaintity. However the design of the airflow is such that it does give you confidence it is actually doing something!

2 rows of 12 inch fans at the back pull air through the cabinet from ducts at the top and bottom of the rack itself. These flow through the chassis and out the back through side venting ducts. This is kind of important as you would want to push these units right against the wall and, as in our case, if you put something next to it you are going to be venting hot air right on top of that unit. This also means that if you want to put the rack in amongst other cupboards you need to give it space at the back behind the others to vent hot air or space at the sides.

The picture shows the vents pushing air sideways from the fan units (each of those fan units clips on and off) and why you need to give it space at the back. It also shows the power distribution at the back and the ease of access you have.


Security

This is where I am not entirely convinced. There are options to secure the rack with a code entry on the front two doors (as per picture) but no locking mechanism round the sides/back. So you can stop the casual user from fiddling with the front of the rack but you can’t stop them taking off the sides and unplugging power round the back! Whether this is a realistic security issue within an office is a different question but it’s nevertheless not as secure as it could be.    


Conclusion (would I buy another one?)

This is a great solution for an in office cabinet which needs active cooling. I like the build quality of the unit and I like the product itself. I would thoroughly recommend this for an office where the situation required it such as the centralisation of servers. Yes, I would buy one again.

Incidentally the company involved (Kell Systems - http://www.kellsystems.co.uk/) has now been bought by APC the very large UPS and server room infrastructure providers. The obviously think that the product is worth their cash.

by Craig

All mobile networks are not equal!

If you have ever done any research, or had the mis-fortune of using many different providers, then you will know that mobile networks do not provide the same coverage and service as each other.

I was recently in the Lake District and, being on Vodafone, was the only person to reliably have signal at any  given time. This wasn’t too much of a problem (as we were on holiday) but became troublesome when trying to co-ordinate times for meeting up and getting hold of friends. So I did a little bit of research on the various mobile phone providers and the reasons why things are different.

Referencing an article written on “Pocket-lint” it would appear that is quite a difference in what infrastructure the mobile phone companies are able to deploy from licences granted some time ago. Remember the auction of those 3G licences that made the national news? Well this explains why that was such a big deal and why it’s a big deal now to anyone looking for a mobile phone contract.

Anyway, have a read!

http://www.pocket-lint.com/news/33965/why-mobile-phone-networks-matter

TLDR;

  • Vodafone have invested heavily in their mobile phone network to ensure both 2G and 3G does not get saturated and you don’t lose signal.
  • Other providers might well supply 95% of the population but does not give 95% of UK coverage (two different things) which makes a difference if you are in the middle of nowhere.
  • When choosing a provider it is important to work out what you want from them and then selecting the provider with the best infrastructure to provide that service to you.