CANâ€™T SEE THE NETWORK FOR THE CABLES?
AUG/SEP 2013 VO L .1 NO. 7 PP100009359
LinkedIn for the IT professional Preparing for 802.11 ac Mobile device selection tips
If you don’t want to be caught with your pants down in the
a u g / s e p
issue of Technology Decisions. With the increasing popularity of cloud applications, wireless connectivity and internetenabled devices, a reliable and competent network is more important than ever. If your network goes down, chances are at least some of your company’s critical functions will go down, and it will be your proverbial on the line. But we’ve got you covered. This tome you hold explains, among other things, how to set a standard corporate mobile device, how to cope with the new IEEE 802.11ac Wi-Fi standard and what the network of tomorrow may look like. On another note, you may have noticed the photo next to this column has changed. We’ve changed editor. Previous editor Anthony Caruana has moved on to focus on his
2 0 1 3
data centre, you should read this
10 | Tech Toys 12 | Peer2Peer: Rob Van Den Brink, Santos 14 | The four golden rules of mobile device selection 16 | What the digital economy really needs ... 22 | DDoS protection keeps Betstar.com.au running 30 | Asia Cloud Forum 32 | News in review 34 | Resourcing the ICT industry
many and varied projects, but will still continue as a regular contributor to Technology Decisions. Longtime readers may remember me as editor of Technology Decisions’ predecessor, Voice+Data. My goal here, as it was there, is to make a magazine that you want to read. So, as always, if you have any comments at all - suggestions, criticisms or photos of your cats - please send them through to email@example.com. Andrew Collins, Editor
F E A T U R E S 04 | What’s next for the network? The network has come a long way since ethernet was created. But what’s happening today and what’s next?
cover image: ©iStockphoto.com/1001 nights
26 | Preparing for 802.11ac IEEE 802.11ac is the next generation of Wi-Fi standard. Proper preparation can help make the most out of the new tech.
20 | How to get a top viewed IT pro profile on LinkedIn IT pros are in the top three categories of people using LinkedIn - so what can you do to ensure your profile stands out?
ALSO available in DIGITAL This magazine and a complete library of back issues are available in digital format at www.technologydecisions.com.au/ latest_issue
w w w . t e c h n o l o g y d e c i s i o n s . c o m . a u
W H AT ’ S N E X T F O R THE NETWORK? Anthony Caruana
We’ve come a long way in just 40 years since the first ethernet network was created. That same year, the first mobile calls were made, ushering in the era of mobile data. But what’s happening today and what’s next?
needs are far more complex. Networks
would execute within a network that of-
are required to connect the people and
fered constant connectivity. And we are
systems that come together as part of
no longer thinking about connecting
complex business processes that often
devices - the focus has shifted to bringing
together people and services.
So are the networks of today equipped
“If you look at today’s world, the ap-
to deal with our increasing thirst for
plications are not sitting on the network.
connectivity? Is there something that has
They’re sitting in a data centre or they
to change? Is it just about better speeds
could be in the cloud,” Divakar added.
and feeds or do we need to rethink our definition of how networks are designed,
The CIOs of today see the network in
deployed and managed in order to
a very different way to their predeces-
quench our needs for the next decade?
sors. Michael Schipp of A10 Networks said, “companies are expecting higher
We will no longer measure our network’s
value for their money - less CAPEX and
performance by the ability to connect or
OPEX - with higher flexibility.”
“WE’ VE GONE FROM LOOK I NG AT SI MPLE E MA I L TO SOCI AL MED IA, VI DE O – PE OPLE A RE POSTI NG TO YOUTUB E . TH E N ET WORK NE E DS TO B E RE A DY.” - DI NE SH DI VA K A R, A LCATEL
LUC ENT. by simple response times. The critical
That desire for new levels of flexibility
measures will be associated with appli-
is causing a profound impact on how
cation availability and performance. So
networks are even conceived.
boasting that the network is rated at 1 Gbps won’t be adequate. The measures
“What we’re talking about with our
will be around execution of business
clients is their hybrid, multilayered
processes and application performance in
strategy in their enterprise. It’s how
increasingly fragmented networks where
they can handle their current and their
users shift between fixed connections,
future requirements,” said Paul Tyrer
wireless and carrier networks.
from Schneider Electric.
looked at the office he was
Dinesh Divakar of Alcatel Lucent said:
The network will move beyond the of-
working in at Xerox PARC in
“People are accessing applications with
fice walls. CIOs will need to create a
Palo Alto and saw a problem.
unpredictable bandwidth requirements.
seamless experience as users move from
There were a number of computers
We’ve gone from looking at simple
the office to the outside networks. “We
and other devices in close proximity
email to social media, video - people
are moving from a multilayer network
but there was no way to transfer data
are posting to YouTube. The network
into a virtualised network,” said Divakar.
between them. Connecting a computer
needs to be ready.”
ack in 1973, Bob Metcalfe
Over the last year or so, it’s become clear
to a printer was not a trivial exercise. So This is a significant change for IT decision
that software-defined networks (SDN)
makers. In the past, network traffic was
are making the move from theory to
Today, connecting devices is only a small
predictable. Applications were designed
practice. Although the transition from
part of what networks are all about. Our
with fixed connections that assumed they
today’s world is not simple, we’re observing
the original design of ethernet was born.
a shift in the market. As Schipp put it, “SDN is shaping up to be a technology that changes networking industry discussions from ‘let’s move packets’ to ‘let’s control a conversation’.” “Software-defined networks are the ultimate, where people are making sure the networks are application-aware for optimised delivery and performance,” added Divakar. Unlike quality of service (QoS), where traffic through specific ports is prioritised, SDN allows traffic to be managed at the application level. This gives
Bob Metcalfe’s 1972 sketch of his original “ethernet” vision. Image provided courtesy of Palo Alto Research Center Inc., a Xerox Company.
businesses the opportunity to optimise service delivery in a far more granular
holds the session open and the attacker
by letting their employees bring their
way. It’s all about making the network
continues to send incomplete responses
own laptops to work and give them ac-
more intelligent. That’s an important
before the server discards the previous
cess to applications for smarter mobile
distinction and one that has far-reaching
requests, causing a drain on system
devices that are becoming more and
consequences, not just for network traffic
resources that impacts application
more convenient and intelligent.”
management but for security.
performance or availability,” said Jan Poczobutt from Barracuda Networks.
Incredibly, if we look at some of the security challenges and issues, it’s re-
Layer 7, or the application layer of the network, is now the new threat surface.
BYOD (bring your own devices) is
ally a combination of attacks that have
Whereas in the past, miscreants would
a significant element of the network
been around for 10 years that are still
launch attacks by pummelling the firewall
extremely popular and still being used. For example, SQL injection attacks on
or other network interfaces with traffic, Schipp said, “Any BYOD device is always
applications have been significant for
a security concern due to the unknown
almost a decade, and application DDoS
Robert Pizzari from F5 Networks said,
security posture of the device, coupled
attacks are also significant.
“The challenge now, if you look at it
with the complexity of performing
from the threats and the types of attacks
end-to-end security with NAC/802.1x
“If an organisation hasn’t figured out
we’re seeing now, firewalls are missing
and with multiple vendors. The same
that it’s their application that connects
Layer 7 attacks.” These are things like
is true with mobile devices - end users
to customers, their application that
SQL injection attacks that don’t attack
want to use their handhelds of choice,
connects to partners – the availability
through the network directly but work by
which can differ from what the company
of the application environment has to
exploiting vulnerabilities in applications
may typically offer. Security at this
be designed around that,” said Pizzari.
that are otherwise trusted on the network.
point then needs to be deployed in a
It’s no longer about infrastructure avail-
place that sits between the end devices
ability – it’s about service availability.
they are now targeting applications.
Gartner research suggests that about 15%
and the networks, and that can process
of DDoS attacks will be at the applica-
huge amounts of traffic in the quickest
BYOD also means managing dual per-
tion layer over the next year.
sona as users have a single device that
“With application DDoS, a request comes
Greg Tompkins of Ipswitch Networks
ness applications. “iPhones and iPads
in that’s a valid request, or appears to
said, “BYOD is a driver for change as
share common resources, they access
be valid but it’s incomplete. The server
companies believe they can save money
rogue Wi-Fi access points in the wire-
accesses both their personal and busi-
“IF YOU LOOK AT IT FROM THE THRE ATS A ND THE TYPE S OF ©iStockphoto.com/HultonArchive
ATTACKS WERE SEEING NOW, FIREWALLS ARE MISSING LAYE R 7 ATTACK S.” - ROB E RT PI ZZA RI , F5 NE TWORK S less airspace, and while in personal use
Findlay said, “Wi-Fi has been a very con-
where connectivity back to the central
they can present a security vulnerability
venient way to hook up some printers and
systems may disappear while data is
as they are more likely to be exposed
people who are mobile in the office. But
to malware and compromised,” said
if you look at what is happening with the
development of the 802.11u standard, the
This has resulted in a change in priori-
heterogeneous networks concept that blurs
ties for IT departments.
Another challenge is the sheer number
the line between having a fixed network
of connected devices. In many homes
and a Wi-Fi network, this will change the
“KPIs about network reliability, which
there are in excess of 30 devices con-
types of services you’ll have for staff and
are sometimes the bread and butter of
nected to the local network. And many
guests. And how do you make that secure?”
IT departments, are a lot less meaningful
of those devices aren’t computers, tablets
than ensuring an application is accessible
or smartphones. Household appliances
Network devices, be they wireless access
such as TVs, Blu-ray players, fridges, air
points, routers, switches or any other
conditioners and other ‘smart’ devices are
appliances, are now simply portals that
All of this is happening in an environ-
contributing to the ‘internet of things’ -
connect users to the services they need.
ment where IT departments are trying
where devices that collect and send data
The idea that the wireless network and the
to develop and deliver “an architecture
are part of the network fabric.
wired network are different is no longer
that is a hybrid of the traditional data
valid. Connectivity is critical.
centre that they own and manage, and
This presents new challenges for network architects and managers. “Everyone talked abut moving from
applications that they run out of the cloud. “There is a fundamental shift in what we
What they’re looking for is a consistency
can do with that connectivity,” Findlay
in performance,” according to Caro.
analog to digital as a big technology
All of this leads us to one essential
change. The real benefit was the effi-
The challenge of cellular connections,
truth – the days of designing applica-
ciency of getting content through. But
even over newer LTE/4G networks, is their
tions with the assumption of a consistent
the move from circuit-based to packet-
network experience and that users will
based communications was far bigger. It
be connected over known interfaces are
has enabled to any-to-any connectivity,”
Alex Caro from Akamai said, “You might
said Andrew Findlay from Vertel.
be getting the full promise of LTE if you’ve
got line of sight to the tower; the reality
“Most IT organisations have come to
Perhaps the most significant change to
is that for the most part your connectivity
recognise that the network is the criti-
the network has been the proliferation
varies quite drastically depending on your
cal delivery platform for all kinds of IT
of wireless technologies. Over the last
actual position. So you have to make sure
services. By focusing on the performance
15 years, cellular communications have
that you can adapt to the connectivity that
and availability of the applications and
made the jump from GSM data to GPRS
your device is seeing right now.”
IT services instead of each piece of
and then to 3G and now to 4G/LTE.
and acceptable,” said Tompkins.
the infrastructure, IT is better able to
And, in parallel, the local network has
That means enterprise applications
support users and business priorities,”
been revolutionised by Wi-Fi.
need to be able to handle transactions
SHAKE THE ROOM Playing digital music needn’t be a solitary experience. Share the tunes with the BOOM social music player, which features 360-degree sound.
e leri /Va om to.c o h p tock ©iS
ux sele Loi
toys BIG PERSONALITY Changeable shells, paired with Windows Phone 8, make it easy to personalise the Lumia 625 inside and out. www.nokia.com.au
CANCEL NOISE WITH NATURE Get back to nature – wherever you are – with these noise cancelling headphones, featuring genuine solid wood ear cups. www.tivoliaudio.com.au
STYLE AND SPEED The Ascend P2 is 8.4 mm slim with an infinity edge 4.7-inch touch display. A 1.5 GHz processor and 4G provide an ultrafast web
WIDE ANGLE LONG SHOTS
With 60x optical zoom and a 20 mm ultra wide-angle lens, the LUMIX DMC-FZ70 is ideal for capturing distant subjects or landscapes. www.panasonic.com.au
LOUNGE-ROOM DIGITAL STORAGE The Central shared storage can keep all your files, documents and media in one network location. Available in 2, 3 and 4 TB sizes. www.seagate.com
PEER PEER Previously, most CIOs and IT departments would have shuddered in fear at organisations taking a mobile approach to work. The strain this mobility placed on IT resources was huge. But now, user virtualisation solutions enable a level of mobility that wasnâ€™t available to employees before. This, along with the ability to allow IT managers to centrally manage and set up any desktop regardless of device, platform or location, means IT teams also see huge resource benefits.
W I N D O W S 7 M I G R AT I O N
ith workforces becom-
removed key pain points, including the
ing increasingly spread
critical roaming profile issue.
across many different locations and employ-
These sorts of user virtualisation solu-
ees using multiple devices, IT manag-
tions allow IT managers to centrally
ers are facing increased pressure on IT
manage and set up any desktop regardless
resources to ensure login times are kept
of device, platform or location.
to a minimum and that employees have reliable access to user profiles, wherever
A further benefit following the migration
they are working.
has been that our service centre is now receiving 30% less profile-related calls.
At Santos, we aim to promote a flexible
Remote employees have also reported
approach to work. But with more than
dramatically decreased login times with
3200 employees and thousands more
users accessing their desktop quickly and
contractors working across several of-
getting straight to work.
fices and many field sites, we were faced with the issue of many remote workers
At Santos, we embraced the solution
taking up to 40 minutes to log in each
for more than just virtualising the user
morning, due to their large profile sizes.
experience; application management stood out as a real advantage for us too.
As a result, our IT helpdesk would spend up to a quarter of their time dealing
It means that our IT team can now
with simple login issues. It was proving
limit access to functions in expensive,
to be a real drain on our resources and
specialist applications by controlling
staff productivity, as well as being an
functionality inside those applications.
incredible amount of time to spend on something as basic as starting up a PC.
It also allowed us to increase security and productivity while reducing support
Our solution to this challenge also had
costs through Windows privilege man-
to address the impending Windows 7
agement. Lastly, it meant we now offer
migration process. With the Windows
a consistent user experience across all
XP cut-off date looming, itâ€™s definitely
Windows platforms, physical and virtual,
something front of mind for IT managers.
and across all devices and locations.
Therefore, Santos engaged with AppSense
Rob Van Den Brink is the manager of IS Operations at Santos. Rob has worked at the ASX-listed company for six years and is responsible for maintaining and continuously improving a stable IS infrastructure and service delivery environment for all at Santos.
to help transition the companyâ€™s laptop
User virtualisation solutions enable a
and desktop fleet from Windows XP to
level of mobility to employees that never
Windows 7 using DesktopNow.
existed before and has allowed for a number devices with fast effective access
The project delivered a Windows 7
to their systems, while at the same time
SOE to the business and, importantly,
cutting company costs.
A N A LY S E
THE FOUR GOLDEN RULES
OF MOBILE DEVICE SELECTION
electing a corporate mobile
ate selection process. While IT-driven
ferent tools. The first step in a mobility
device standard can be risky.
standards worked well for the desktop,
strategy is to interview a broad range of
Mobile devices are far more
this approach creates a significant risk for
real users to discover the generalised ‘use
personal than PCs, and users’
the CIO if the device selection process
cases’ which are then used to define the IT
preferences are heavily influenced by
does not include the practical experience
architecture (applications, integration,
their existing consumer experience and
and feedback from the business users
management and devices). This takes
who will be using these devices in the
2-3 months, but is critical for success.
field. An IT-centric selection process Imposing an IT-driven device standard
may put the CIO in the position of
2. User experience is king!: Since the
increases the risk of the CIO being
defending a decision that is unpopular
IT organisation is responsible for sup-
forced into defending the decision against
with end users, some of whom (board,
porting, managing and securing the
disgruntled end users, some of whom
executive, senior managers) have great
devices, it can fixate on these IT issues
may have considerable influence. To
influence and, often, strong opinions on
at the expense of the user experience.
avoid this, follow the four golden rules
To create a solution that works well in
of mobility and ensure mobile device selection has business buy-in.
the field, the IT organisation must be To avoid this risk, follow these four
willing to subordinate its usual device
golden rules of mobility:
considerations to the user experience. Create a short list of device criteria that
IT organisations are under considerable pressure to deliver mobility solutions.
1. Use case dictates device: In mobility
are important for each use case. Select
This may be as simple as mobile email
the device must be viewed as a ‘tool of
devices that optimise the user experience
and calendaring for white collar work-
trade’ and different roles may need dif-
for the different use cases and roles based
ers or as complex as managing and optimising a field service workforce. In most cases, users of the mobility solution will already have high expectations based on their personal consumer device experience. In many organisations that IBRS has worked with, users have already implemented their own mobility solutions without the IT organisation’s involvement and a savvy CIO will look at how this existing, practical, usability experience can be harnessed. In an effort to re-establish control over the end-point, some IT organisations are
rushing to a corporate mobile device standard without following an appropri-
Figure 1: IBRS device selection process
on these criteria, remembering the field
IBRS device selection process
users are more likely to know what is
The selection process consists of the fol-
and isn’t important.
3. BYO is a safety valve: Whichever
When establishing the working group
device is selected, and regardless of
ensure there are representatives from the
the processes, some individuals will
most influential business areas. Get these
be unhappy with the decision. The
representatives to nominate who should
implementation of a BYO smartphone
be interviewed for the input stage. The
or tablet policy will act as a safety valve
output of the selection processes must be
and minimise pushback on the decision.
a formal, written recommendation for a mobile device, including all the informa-
Do not mistake BYO device as a carte
tion and data used to make this decision.
blanche licence to bring any device,
This recommendation should be given
hook it up to the internal network and
to the IT Steering Committee for review
access any application. Instead, establish
a clear policy covering the ‘who, what and how’ of BYO devices. Create a BYO
smartphone and tablet policy that allows
Before selecting a device, ensure the mo-
some flexibility without overburdening
bility use cases have been identified from
the IT organisation or jeopardising
a broad set of interviews with real users.
Dr Kevin McIsaac has over 20 years of IT experience and is a recognised expert in IT infrastructure, operations and vendor management. He has in-depth knowledge of server virtualisation, storage and virtual desktops. He has worked as an analyst for more than 11 years, and was the Research Director Asia-Pacific at META Group.
security. 1. Determine which business groups must 4. Inclusive, transparent and auditable:
be closely consulted on device selection
Since most users already have a consumer
and ask them to provide a representative
smartphone, and often extensive experi-
for the selection workshop.
ence in that specific device, trying to
2. Formalise the process and ensure all
impose an IT-driven standard will lead
parties know what the objectives are well
to significant pushback. To counter this,
before the meeting.
run a selection process that includes
3. Clearly establish how the working
representatives from all business groups
group makes a decision (what is the
and create a formal recommendation
that clearly shows how the decision was
4. Create a formal written recommenda-
reached and why. Done appropriately,
tion that shows how the decision was
and in conjunction with BYO, this will
made. Circulate this to the workshop
limit the negative reaction to whichever
member for adoption prior to sending
device is selected. A model for the process
to the IT steering committee for review
is provided in Figure 1.
W H AT T H E
D I G I T A L E C O N O M Y R E A L LY N E E D S . . . Last month the then Minister for Broadband, Communications and the Digital Economy, Senator Stephen Conroy launched, with little fanfare, the government’s update to its National Digital Economy Strategy - Advancing Australia as a Digital Economy. The strategy is critical, not just to the ICT sector but to every other sector that stands to benefit from the transformational nature of 21stcentury digital technology.
mphasising the critical role of
and technology development, are essential
information and communications
to building Australia’s future.
technology (ICT) in driving global innovation and growth, Advancing
Australia’s own National ICT Australia
Australia as a Digital Economy outlines 24
(NICTA) is proof of that point, spinning
actions focused on facilitating Australia’s
out 10 times the number of new companies
per $100m invested than the national average and contributing, on average, some $330m
This is not an area which is up for grabs
per annum to GDP through the direct cost
in the party political stakes. In terms of
savings and revenue generation it is achieving
Australia’s ambition to be a world-leading
through ICT-led projects.
digital economy, the message from both the government and Coalition must be clear,
Overlooking the role of ICT-driven R&D
consistent and reinforced by action. For
and institutions such as NICTA, the risk
business and the community the message
is that we won’t develop the fundamental
must be one of confidence to embrace the
competitive capability necessary to keep
opportunities of ICT-driven transformation.
pace with our peers - let alone our emerging
Our political leaders need to model that
competitors. And without clear, universally
preparedness to accept and manage - indeed
agreed metrics, it will be hard to know how
exploit the change that emerging technolo-
we are tracking. If Australia is to value the
gies bring about.
contribution ICT makes to its economy, then it needs to measure it.
The ICT industry contributes nearly 8% of Australia’s GDP, generates in excess of $91b
The Australian Information Industry As-
of revenue and drives a digital economy
sociation (AIIA) welcomes all the initiatives
valued at some $100b (Australian ICT
outlined in the government’s updated Na-
Statistical Compendium, ACS, 2012, p11).
tional Digital Economy Strategy. We particu-
It is underpinning innovation, productivity
larly applaud strengthening the transparency
and capability development for Australia’s
and accountability of government itself.
ongoing international standing. Without a doubt, the strategy is an impor-
Suzanne Campbell, CEO, AIIA
If there is any area where Advancing
tant step forward in positioning Australia
Australia as a Digital Economy requires
to be competitive in a transformed global
strengthening, it is here - stimulating and
economy. All we need now is unequivocal
supporting the high-end, cutting-edge,
bipartisan support, commitment to some
smart ICT-driven R&D necessary in a
specific delivery targets by both sides of
dynamic, innovation-led competitive global
politics and, with some ‘tweaks’ to the
market. Investment in R&D and the pres-
strategy, we are well on our way.
ence of high-quality scientific institutions
that generate the knowledge to build new
Simply being a digital economy is not
technologies, combined with the collabora-
enough. We need to be one of the smartest,
tion of universities and industry in research
most progressive in the world.
H O W TO G E T A TO P V I E W E D
IT PRO PROFILE ON LINKEDIN
IT professionals are in the top three categories of people using LinkedIn - so what can you do to ensure your profile stands out and captures the attention of your target audience? It doesn’t matter whether you are seeking new clients or a new employment opportunity, spending some time improving your profile can really pay off. The good news is that it only takes a mixture of technical expertise and some sexy front-end magic to make your profile really stand out.
ere are my top tips to get
along with the person who is a first-,
your profile in the top 1%
second- or third-level connection. If you
of those viewed on LinkedIn:
would like to test if your profile has enough keywords to sit at the top of searches, I
1. Keyword optimise. LinkedIn is a search
recommend identifying 5-7 keywords that
engine optimised site. Those profiles that
your target audience may search for. Then
have the most relevant keywords are the
place them throughout your profile in as
people who get found the easiest. For
many sections as possible.
example, If am searching for someone who can assist with websites in Brisbane, I
Once your profile is keyword optimised,
may type in the keywords “Web Designer
you can check and monitor your rankings
Brisbane”. The person with the most key-
for each keyword. LinkedIn ranks results
words will turn up in that search result
according to relevance/relationship to
2. Key skills. Another great tip is to
stakeholders. Tertiary qualified with a
check on the keywords that are being
wide variety of local and international
most sought after and ensure those words
experience.” These tasks also need to be
are in your profile. You can check this
the keywords you want to be found for.
on the www.linkedin.com/skills page.
• 2nd paragraph: “Some of the organisa-
For example “Enterprise Architecture”
tions I have worked for include ...” If
searches currently have increased by
these brands elevate your brand then
1% in the last year. However, the skill
list them here - even though they are
“Enterprise Governance” is up 10%. It
already in your career history. Ensure
is important to cover all bases and the
you put the most important information
good news is that you can use up to 51
to the top of the page.
• 3rd paragraph: “Career achievements
include …” and list your top 3-5 3. Ask for recommendations. The best
achievements. How did you save time,
way to get a recommendation is to give
money, increase turnover, increase ef-
one! For every 10 people you ask, you
ficiency? Make sure there are numbers
normally get five back so ask away.
here that quantify what you’re saying.
Also, if you can, ask them to add your
• 4th paragraph: “How I can help you ...”
keywords. What others say about you
or “Key Specialities”. Again these should
is more important than what you say
be based on the keywords someone
would be searching for and it’s a great way to repackage your keywords and
4. Ensure your title reflects the keywords
double your search engine optimisation.
that you want to be found for. If your title is “Director of Zenith Associates”,
6. Proactively connect with others.
the likelihood of someone trying to find
This might seem simple but I see a lot
you is very low. Ensure your title reflects
of profiles of clients who don’t connect
what you do, for example if you are the
with anybody. Research tells us that your
Director of Zenith Associates but you
search results will start to kick in at about
are actually an IT Director, ensure your
40 connections. Also, you will only turn
title is “IT Director, Sydney”.
up in search results where you are a first, second or third connection.
5. Write a BOOM summary. By this I mean it meets the blend of key words and
7. Use the media plug-ins. This is the
of your brand. This section is limited to
biggest opportunity missed with many of
you so it’s best to do a Google ‘X-ray’
only 2500 characters so I recommend the
my clients. The summary and experience
search instead. To check your rankings
areas have the option to add in videos,
within the LinkedIn Australia website,
• 1st paragraph: This is your LinkedIn
documents; graphics which can help
follow these steps:
elevator speech and should cover your
showcase your talents.
title, years of experience and what • Log out of LinkedIn
you want to be doing. For example.
• Enter the keyword into the Google
“Professional IT Director with over
browser eg, if you’re looking for the
25 years’ experience in Consulting,
keywords ‘IT Manager’ and you’re based
Business Analysis and Enterprise &
in Sydney, you would enter: site:au.
Solutions Architecture within which
linkedin.com “IT Manager Sydney’
Process Improvement, Performance
• Review the Google results to assess your ranking.
Management, Business Process. Ability to liaise with internal and external
Jane Anderson is a professional and experienced certified career and business coach. She also assists businesses and individuals to explore their personal brand and get the best out of their linked in profile. She is also the author of ‘How to use your linked in profile for career purposes’. Anderson is also a successful speaker and runs regular linked in workshops. More details can be found at insideoutcoach.com. au or jane-anderson.com.au.
DDOS PROTECTION KEEPS work B E T S T A R . C O M . A U R U N N I N G
nline betting website Betstar.com.au was recently
Betstar was down for 30 minutes before switching over
taken down, when a DDoS (distributed denial
to a redundant system, while the competitor’s site was down
of service) attack aimed at a competitor in the
for an entire day.
same co-location data centre took Betstar’s
Following the attack, Dunne began to look for a DDoS
site with it. Betstar decide it was time to implement DDoS
mitigation service. Betstar’s infrastructure provider recommended
Prolexic for DDoS protection.
Betstar.com.au offers internet betting on Australian
Betstar contracted Prolexic to supply its PLXproxy (non-
and international sports and racing. Site performance and
emergency) DDoS mitigation service. Betstar also uses Prolexic’s
availability are particularly critical during the weeks of the
protected DNS service for all of its domains.
Spring Carnival leading up to the Melbourne Cup. “The weeks leading up to the Melbourne Cup are extremely busy,” says Bryan Dunne, IT manager at Betstar. “This time
“The cost of a site outage due to DDoS far outweighed the cost of protection, and Prolexic gave us a very fair price,” Dunne said.
period makes the year for every online bookmaker in Australia.
Almost immediately after the Prolexic solution was
If you experience website outages during Spring Carnival, then
deployed, Betstar experienced a DDoS attack indirectly. The company shared a name server and data centre with a competitor and when that firm was targeted by a DDoS attack, the Betstar website experienced a brief period of downtime due to collateral damage. The DDoS attack came through one server that was not protected due to the fact that its DNS name change had not yet replicated completely around Australia. Betstar needed to keep that server available so that people could still access the site, but despite that vulnerability to attack and a brief outage, Betstar was able to switch to a redundant server and continue serving customers. Dunne said that the Prolexic solution causes no latency issues, despite routing Betstar’s site traffic from its Australia-based network through Prolexic scrubbing centres in the United States. “Latency is a key concern for our website,
you can wipe out a nice chunk of your profits for the year.”
and we were concerned that routing traffic to the US would
Recently, during the first weekend of the Spring Carnival
add seconds to page-load times, which could have a massive
racing season, attackers launched a high volume DDoS attack
impact on our business,” Dunne says. “Prolexic assured us that
against the IT infrastructure of one of Betstar’s competitors.
latency would be less than a half second, and it has been, even
The two companies share infrastructure at a co-location data
at very busy times.”
centre, so when the 10 Gbps DDoS attack on the competitor’s
With DDoS protection, Betstar has a lower risk of losing
website brought down the entire data centre, both sites
revenue or potential customers at the company’s most profitable
time of the year.
STRUCTURED CABLING POWERS MEDICAL RESEARCH
etwork infrastructure is a vital part of the South Australian Health Medical Research Institute’s (SAHMRI) new research facility in Adelaide.
SAHMRI is a new, $200 million facility built to attract researchers from Australia and around the world. Every aspect of the ten-floor building is designed to make full use of innovative systems that support state-of-the-art research activities. Network infrastructure is the foundation for all scientific and administrative systems at a major research establishment, so network performance is critical to research efficiency. To ensure SAHMRI was built with the best available infrastructure, the project team assessed a wide variety of structured cabling options. After rigorous comparisons of performance, operating costs, quality and support services, the team chose SYSTIMAX 360 solutions from CommScope.
as they make moves, adds and changes, so they work faster with fewer errors.”
Integrated infrastructure In addition to connecting data systems, the SAHMRI network also supports other extra-low voltage systems including building management, security, Voice over Internet Protocol (VoIP) and lighting control. With so many critical applications depending on the same infrastructure, SAHMRI needed reliable copper and fibre cabling. To select the right CommScope solutions for this requirement, SAHMRI worked with TAF & Associates — part of the CommScope PartnerPRO Network — and Aurecon Consulting. Their decision was to use GigaSPEED X10D® copper cabling for horizontal connections and a combination of TeraSPEED® and LazrSPEED® fibre for network backbones.
Their decision included iPatch, a solution that gives systems managers a real-time view of the network physical layer. iPatch enables fast troubleshooting and improved security, reducing network downtime and making maintenance more cost-effective.
GigaSPEED X10D® exceeds the full Category 6A/Class EA standards for 10G data transmission over unshielded copper cabling. It delivers 10 GB/s data transmission up to 100 metres with four connectors in the channel. The cable also has the smallest diameter in its class, saving space and making installation easier.
“The direct and indirect operating cost benefits of intelligent infrastructure soon outweigh any extra initial cost,” said Michelle Gheorghiu, project director at SAHMRI. “Up-to-the-moment information on connection status helps minimise costly network downtime. Displays on the patching frames provide technicians with guidance
TeraSPEED ® singlemode, zero-water peak-fibre cabling delivers 50 percent more usable wavelength range than conventional single-mode fibres. It supports up to 16 channels of Coarse Wave Division Multiplexing (CWDM) and up to 400 channels of Dense Wave Division Multiplexing (DWDM). LazrSPEED ® 550 multimode,
laser-optimised fibre supports 10 GB/s transmission over backbone connections up to 550 metres without need for expensive electronics. Copper and fibre connections in the SAHMRI installation are managed using iPatch panels that allow system managers to monitor network connections and attached devices from a desktop PC. The iPatch software can also automatically alert managers to any unauthorised network connections changes. Change orders can be created and sent to displays on the distribution frames. On-screen instructions guide technicians on where to make new connections. When completed correctly, the iPatch software notifies system managers and updates network diagrams held in the iPatch database.
Consolidation points The network infrastructure designed and installed at SAHMRI by TAF & Associates has nearly 5,000 Category 6A outlets. To provide connections for all current and future systems supported by the network, the building’s ten floors are flood-wired with GigaSPEED X10D® cabling. This is linked back to 18 distribution frames via multiple distribution points on each floor, making it easy for the institute to reconfigure work areas. As research teams initiate new projects and complete existing ones, systems and equipment can be added or removed from the network very quickly. In this dynamic environment, iPatch helps optimise the allocation of
cabling resources and ensure new connections are made quickly and correctly. “With the vision, knowledge and control they get from iPatch, our facilities managers can stay a step ahead of demand for connectivity throughout the building,” said Gheorghiu. “They can instantly see what connections are available — and they know that the network diagram in the iPatch database is always accurate. This is essential for providing high-quality service to researchers at the institute.” The SAHMRI installation is the first in Australia that manages all extra-low voltage services using the iPatch solution. To complete the configuration and commissioning of all these systems, TAF & Associates deployed a team of ten engineers and technicians. In total, they installed 366 km of GigaSPEED X10D® cable routed above ceilings to dropdowns connecting desk-mounted outlets. All of these connections and their fibre backbones are monitored and managed via 90 iPatch panels and 17 iPatch rack manager units installed on the distribution frames. To accommodate the consolidation points for the horizontal cabling, the TAF team worked with Aurecon to design floor plates that provided sufficient space. They also designed the backbones cables with redundant fibres, connecting all floors to improve network resilience.
T E C H N I C A L LY
P R E PA R I N G YO U R W L A N FOR THE NEW IEEE 8 0 2 . 1 1 A C W I - F I S TA N D A R D Dr Jacek Kowalski
IEEE 802.11ac is the next generation of Wi-Fi standard. It improves data rates, network robustness, reliability and bandwidth efficiency. This is essential given increasing mobility and BYOD. It is important for enterprises to understand their application requirements and how and where these devices may be used within a network to leverage the new standard.
s the number of mobile ap-
Prohibiting workers from bringing their
plications has grown, the in-
personal mobile devices to work is not a
creased use of smartphones/
real option and providing ample wireless
tablets has resulted in a rise
bandwidth for enterprise users is a chal-
in bandwidth demand. This increased
lenge with the current Wi-Fi standards
demand is mirrored in the corporate
BYOD context because users expect the same experience at work that they
The new standard
have at home. Streaming video, database
IEEE 802.11ac has been defined with the
searches, file transfers and voice over
promise of delivering significant increases
Wi-Fi are applications that are placing
in bandwidth while improving the overall
ever-increasing demands on a networkâ€™s
reliability of a wireless connection. The
ability to provide consistent bandwidth.
ultimate goal of this standard is to produce
the previous standards and implements
of fully supporting first-generation
new enhancements, yet it maintains
802.11ac products. Understanding how
backwards compatibility with previous
and where these devices may be used
generations of 802.11 in the 5 GHz band.
within a network is critical.
For the enterprise, 802.11ac represents
First-generation 802.11ac access point
a better way to deploy Wi-Fi in the 5
(AP) products will have to be matched
GHz band. As 802.11ac clients come into
with peer 802.11ac clients. This means
the enterprise, 802.11ac will let vendors
that a three-stream, 80 MHz channel con-
build Wi-Fi infrastructures that make
nection can only be supported between
more efficient use of the 5 GHz band,
matching AP/client pairs. The maximum
creating high-capacity voice systems
benefit from the 802.11ac standard can
and pools of multimedia streaming.
be ensured wherever peer-to-peer VHT
Enterprise Wi-Fi networks can also use
applications can be identified. Multi-
802.11ac technology to create Virtual
media applications are obvious choices,
Hold Technology (VHT) wireless back-
but there may be other applications that
haul links or wireless bridges.
can benefit from 802.11acâ€™s increased
bandwidth. Use of machine-to-user, There will be a gradual transition to
machine-to-machine or real-time secu-
802.11ac in the enterprise, and because
rity applications are potential candidates
the 802.11ac technology is implemented
for 802.11ac deployments.
at the chip level, hardware replacement will be required. However, 802.11n will
With second-generation 802.11ac prod-
not be displaced by 802.11ac. The two
ucts, multiuser multiple-input and
standards will coexist in enterprise wire-
multiple-output (MIMO) will be sup-
a single-radio design with wireless data
less networks to continue to support
ported, expanding the deployment op-
rates in excess of 1 Gbps. As with previ-
legacy devices in the 2.4 GHz band.
tions available to network planners. It
ous extensions to the 802.11 standard,
will no longer be a requirement that the
802.11ac augments the standard with
Status of IEEE 802.11ac
AP and client have to be matched to the
new enhancements while continuing to
802.11ac is not yet an approved in-
physical link layer. Mobile clients that
support all legacy 5 GHz 802.11 devices.
ternational standard. Unlike previous
support 802.11ac will also have improved
generations of 802.11, however, there is
battery life as a benefit.
Products based on 802.11ac will meet
no controversy concerning the techni-
the challenge of supporting the new
cal details of the current draft version.
wireless bandwidth demands coming
As a result, Wi-Fi silicon providers are
IEEE 802.11ac is for consumers, not
into the enterprise.
comfortable developing chipsets based
enterprise networks: While 802.11ac is
on the 802.11ac draft before it is formally
initially targeted at consumer applications,
ratified. Providers are already bringing
it is also important for enterprises. High-
802.11ac specifies changes for both the
draft 802.11ac chips to market. Final rati-
performance multimedia tablets will be
physical and the media access control
fication is expected in December 2013.
the first Wi-Fi clients to adopt 802.11ac.
(MAC) layers of the 802.11 standard,
Employees are bringing the devices into the enterprise, and organisations need
the wireless range and coverage in the
Enterprise IEEE 802.11ac considerations
5 GHz band and delivering very high
In deciding whether or not to deploy
integrate them into the corporate network
throughput to 802.11ac-capable clients.
802.11ac, it is important for organisa-
securely. The new enterprise wireless LAN
tions to understand their wireless ap-
infrastructure needs to provide the capac-
As with earlier IEEE 802.11 amendments,
plication requirements. Initially, there
ity and quality of service demanded by
802.11ac specifies improvements over
may be only a few devices capable
these devices. 802.11ac will provide better
enabling significant improvements in
to add secure guest access for them or
coverage in the 5 GHz band, increased
barrier - Wi-Fi supporting single-station
systems used in today’s networks. Only
capacity, support for more devices of all
throughput greater than a gigabit per
the APs will be candidates for replace-
types and improved reliability in harsh
second. But 802.11ac is much more than
ment and that will depend solely on a
a speed bump and the improvements are
site’s requirements. 802.11ac may be
targeted at many different classes of Wi-
introduced as an overlay to an existing
IEEE 802.11ac w ill replace IEEE
Fi devices. 802.11ac will bring significant
802.11n network, retained to support
802.11n: The two standards will actu-
benefits for next-generation, low-power
2.4 GHz b/g/n devices.
ally complement each other. 802.11n will
Wi-Fi clients such as smartphones. A
not be replaced because it is needed to
single stream 802.11ac smartphone will
support the 2.4 GHz band. 802.11ac will
be able to transmit three times more data
IEEE 802.111 will deliver very high
be an upgrade to the 5 GHz portion
using the same power or less. Wireless
throughput for streaming multimedia
of the enterprise wireless LAN. Most
LAN infrastructures based on 802.11ac
devices, improvements in range, ex-
enterprise Wi-Fi systems will support
will be able to support multiple 802.11ac
panded system capacity and network
both standards for many years to come.
devices at the same time in the same
resilience to interference. This will
802.11ac can be inserted by replacing
channel, making more effective use of
boost application performance for any
existing APs with dual-radio (802.11n
enterprise with a high density of mobile
and 802.11ac) APs or 802.11ac products
devices. The BYOD trend will compel IEEE 802.11ac will require a ‘rip and
enterprise networks to support 802.11ac.
replace’: Not necessarily. In many im-
Fortunately, 802.11ac technology can
IEEE 802.11ac is for high-powered,
plementations, the network software -
be easily integrated into an enterprise’s
gigabit-per-second clients only: A lot
such as the network operating system
existing Wi-Fi network and will add
of the excitement about the 802.11ac
and network management application
the bandwidth to support the influx of
standard is about breaking the gigabit
- will operate on the same computing
can be installed as a network overlay.
ASIA CLOUD FORUM The Asia Cloud Forum, an online media portal, has been created to represent the interests of enterprise users, governments, telcos, vendors, policy makers and others with a stake in the development of cloud computing in Asia.
Cloud collabs: rival vendors looking chummy for now Melissa Chua Traditional bitter rivals in the IT vendor space appear to be
Oracle also unveiled a cloud alliance with NetSuite, aimed at
putting their differences aside and forming partnerships with
delivering cloud-based services to mid-size businesses. The pact
one another in a bid to expand their cloud footprints.
will see the integration of Oracle’s human resources product with NetSuite’s services for ERP.
These partnerships, aimed at countering common cloud pitfalls such as integration issues, silos and complexity, have been formed
These partnerships could signify further integration between
likely out of necessity, as IT bigwigs battle with the likes of
applications as enterprises manage their cloud environments in a
Amazon Web Services in capturing the cloud market.
bid to boost productivity. According to the 2013 State of Cloud Computing survey by InformationWeek, 41% of respondents said
Just last month, Oracle, faced with diminishing market share in
they use custom coding, while 33% indicated a lack of cloud
its traditional software business due to companies shifting to
cloud providers, put its rivalry with Microsoft and Salesforce. com aside and formed alliances with each.
An Oracle-commissioned survey, conducted last year, showed 54% of respondents indicating their departments had suffered
The first collaboration will allow customers to run Oracle
downtime in the last six months due to cloud-integration prob-
software such as Java, Oracle Database and Oracle WebLogic
lems. While 50% of respondents claim to have integrated cloud
Server on Windows Server Hyper-V and Windows Azure. The
applications to the extent of being able to access cloud data
joint deal covers both bring-your-own licences and pay-per-use
in other departments from within their department’s business
application, one in two departments are still unable to do so.
The second agreement, a nine-year deal, will see Salesforce.com
Of the Oracle-Microsoft partnership, Forrester analyst James
standardise on Oracle’s Linux operating system distribution, Java
Staten noted in a blog post that the deal provides Microsoft
middleware and Exadata server platform. For its part, Oracle will
with competitive advantages as well because Hyper V will ap-
integrate Salesforce.com into its Fusion human resources and
pear stronger against VMware’s vSphere since Oracle software
financial management cloud platforms, in addition to deliver-
is today supported only on OracleVM and Hyper V.
ing the core technology to power Salesforce.com’s applications
and CRM platform. Salesforce.com will also use Oracle’s Fusion
Staten added the deal would also give Windows Azure “near equal
cloud applications in-house.
position” against Amazon Web Services in the cloud platform war.
W W W. A S I A C L O U D F O R U M . C O M
28 - 31 October Gold Coast, Australia gartner.com/au/symposium
The World’s Most Important Gathering of CIOs and Senior IT Executives Early Bird: Save $500 when you register now* Leading in a Digital World • Gain the vital edge required to develop as a leader in a digital world • Recognize which megatrends, innovations and technologies will impact your IT strategy, including the Nexus of Forces - social, mobile, cloud, information • Capitalize on leadership, innovation and investment opportunities for CIOs • Confirm the strategic IT direction of your company
*Early Bird Discount ends 30 August
Premier sponsor 31
NEWS IN ©iStockphoto.com/TommL
AUSSIE DEFENCE AGENCIES BAN LENOVO DUE TO BACKDOOR FEARS Computers from Chinese company Lenovo have been banned from “classified” networks of the intelligence and defence services of Australia, the United States, Britain, Canada and New Zealand due to concerns that the machines could easily be hacked. A report from the Australian Financial Review said that intelligence and defence sources in Australia and Britain have confirmed a written ban on computers made by Lenovo from being used in classified networks. Lenovo said it wasn’t aware of the ban. According to the AFR, the ban was introduced in the mid-2000s after testing of Lenovo equipment found “back-door” hardware and AD_TecDes_LCBP_AUS_Layout 1 7/22/13 “firmware” vulnerabilities in the company’s chips. 8:46 AM Page 1
R E V O L U T I O N I Z I N G H I G H D EN S I T Y F I B E R PAT C H I N G
Innovative, Easy Access, Push-Pull Latch Activation Specifically designed to simplify fiber jumper access in tight-fitting, high-density patching environments, Siemon’s revolutionary LC BladePatch fiber jumpers feature an exclusive boot/latch mechanism that allows the cord to be securely inserted and easily removed via the push-pull boot – eliminating the need for direct access to the latch in space challenged applications. In addition to the innovative push-pull design, the duplex LC BladePatch latches can be rotated 180 degrees to quickly and easily make polarity corrections. These new innovative jumpers utilize a smaller diameter uni-tube cable that reduces cable pathway congestion for improved airflow and energy efficiency as well as simplifying overall cable management. Combined with its low-loss Multimode and Singlemode performance, the LC BladePatch is the ideal LC fiber patching solution for today’s high-speed, high-density network connectivity needs. Learn more and engage with Siemon experts at www.siemon.com/lcbp
Low profile boot design optimizes side-stackability
W W W
Multimode: 50/125 OM3 and OM4 Singlemode (UPC): OS2
S I E M O N
C O M
Fits within any standard LC adapter opening or LC SFP module
Exclusive rotating latch design supports simple field polarity changes without the risk of fiber damage
The push-pull design enables easy access and removal via the boot in tight-fitting areas
Sources within the British and Australian defence and intelligence communities said that malicious modifications to Lenovo’s circuitry were found that could allow someone to remotely access the devices without the user’s knowledge, the AFR reported. Lenovo has links to the State Council of China: the PC manufacturer is part owned by Legend Holdings Limited, which is in turn part owned by the Chinese Academy of Sciences - a State Council institution. Despite this ban on classified networks, Lenovo is a supplier of computers for “unclassified” government networks in Australia and New Zealand’s defence departments, the AFR said. Lenovo told The Register that: “Our products have been found time and time again to be reliable and secure by our enterprise and public sector customers and we always welcome their engagement to ensure we are meeting their security needs.” “We’re surprised by this development as Lenovo continues to have a strong relationship with all Australian government departments. Customer data privacy is a top priority for Lenovo across all customer groups,” the company said. But the Department of Defence said that the AFR’s reporting of “a Department of Defence ban on the use of Lenovo computer equipment on the Defence Secret and Top Secret Networks” was “factually incorrect”. “There is no Department of Defence ban on the Lenovo Company or their computer products; either for classified or unclassified systems,” a statement from the department read.
P O LYC O M C E O Q U I T S A F T E R E X P E N S E “IRREGULARITIES” REVEALED
Andrew Collins Polycom boss Andrew Miller has resigned after the company uncovered “irregularities” in his expense submissions. Following the news of Miller’s resignation, several law firms have launched their own investigations into Polycom or its staff. Polycom revealed the resignation several paragraphs into an earnings announcement on Tuesday. The company said Miller resigned as CEO, president and a board member last Friday after the board’s audit committee found “certain irregularities” in his expense submissions. Miller has “accepted responsibility” for the irregularities, the company said. But Polycom did not expand on what those irregularities were, instead saying that “The amounts involved did not have a material impact on the Company’s current or previously reported financial statements for any period, nor did they involve any other employees.” Kevin Parker, who joined the Polycom board in January 2005 and became chairman in May 2013, has been appointed as interim CEO. Parker said: “Andy Miller’s resignation under these circumstances is disappointing and should not be viewed as a reflection of the financial integrity of the company, the strength of our team or our plans for the future. … we thank Andy for his four years of service.”
In a document filed with the US Securities and Exchange Commission on Tuesday, Polycom said that on the previous day it had entered into a separation agreement and release with Miller. According to the agreement, Miller will continue on at Polycom as a non-executive employee - available to the company to provide transition services - until 15 August 2013. He will receive a lump sum cash payment of US$500,000, less applicable withholdings. Miller will also receive his bonus for the first half of 2013; a lump sum cash payment equal to 12 months’ worth of reimbursement under the US’ COBRA health program; preservation of pre-existing indemnification rights by Polycom; and up to US$25,000 to help cover attorneys’ fees incurred in reviewing and negotiating the agreement. He’ll also get to keep two company-issued laptops, an iPad and a mobile phone. The lawyers Following the news of Miller’s exit, several law firms have launched investigations into Polycom or its staff. Bronstein, Gewirtz & Grossman, a corporate litigation boutique, said it is investigating potential claims on behalf of purchasers of Polycom securities. The firm said it’s looking into whether Polycom and its executives violated US federal securities laws. Johnson & Weaver, a shareholders’ rights law firm, said it has commenced an investigation into whether certain officers and directors of Polycom violated state or federal laws.
FORWARD THINKER RESOURCING THE ICT INDUSTRY Elizabeth Rudd, Director, FutureNous
and 95% growth in usage of mobile or
volume of e-waste. About 40% of e-waste
of resource usage which cur-
wireless devices to access cloud comput-
is telecommunications and consumer
rently provide opportunities for
ing or internet applications. While energy
electronics products (another 40% is large
the industry to lessen its envi-
usage from an individual user is small,
ronmental impact: overall energy usage,
when all users are aggregated, energy
electronic waste and rare earth metals.
consumption is high. CEET estimates data
Rare earth minerals (REMs), the third
How these areas are managed impacts
centres account for 9% of overall energy
area, are not necessarily rare but are often
the industry’s future.
consumption, while wireless networking
found in quantities where mining is not
technology accounts for 90%.
economically viable. Used in small quanti-
The amount of energy used to power
ties in many high-tech goods including
servers, PCs, and data centres has grown
The second area, e-waste, is concerning
computers, smartphones and screens,
as the use of computers and storage of
due to the level of toxic materials used
the collection of 17 elements is vitally
data has increased exponentially. Cloud
in the manufacture of electronic devices.
important. Currently, China has a virtual
computing, with centralised servers and
Low recycling rates mean most e-waste
monopoly on REMs, with many estimating
data storage utilised by many customers,
ends up in landfills where the toxins leach
China controls 90-97% of world supply.
may improve the industry’s energy profile.
into groundwater or is incinerated with the toxins sent airborne. At 3-5% growth rates,
Australia, the US and Japan have all
A recent study funded by Google found
e-waste is the fastest growing category of
identified deposits of REMs but it will
organisations can reduce energy con-
waste, with the United Nations Environ-
be some time before these mines are
sumption of ICT up to 87% by moving
ment Programme (UNEP) estimating the
operational. In the meantime, China has
email, customer relationship manage-
current volume at 40 million tonnes per
restricted exports leading the European
ment software and productivity software
annum with only 20% recycled. Currently,
Union, US and Japan to file a complaint
(spreadsheets, word processing) to cloud
80% of all recycling is sent to facilities in
against China with the World Trade Or-
developing countries where it is processed
ganisation. Unfortunately, little research
without regard for individual and environ-
has been undertaken to find alternatives
mental safety creating additional problems.
to these materials. Recycling and reducing
Perhaps of greater concern to the indus-
obsolescence could assist.
try’s future is the energy inefficiency of
wireless networks. A study by Australia’s
Manufacturers could build goods to last
Centre for Energy-Efficient Telecommu-
longer or make them easier to upgrade
Other industries utilise technology to
nications (CEET) estimates per annum
and replace parts like batteries, lowering
reduce their environmental impact; ICT
growth of 78% for mobile data traffic
the high rate of obsolescence and the
has the opportunity to do the same.
he ICT industry has three areas
>> $60.00* a year
(non-IT professionals) to Technology Decisions and you will pay * within Australia. Please apply for International rates.
>>> F R E E
for Technology Decisions and we will deliver you 7 information-packed editions FREE.
The magazine is available FREE to IT and business professionals. Go to the website now and complete the simple registration form. w w w. t e c h n o l o g y d e c i s i o n s . c o m . a u / s u b s c r i b e You can choose to receive the print magazine and/or the eMag. To ensure you are updated with key information between issues, sign up for the twice weekly eNewsletter too!
A.B.N. 22 152 305 336 www.westwick-farrow.com.au
Editor Andrew Collins firstname.lastname@example.org Chief Editor Janette Woodhouse email@example.com Publisher Geoff Hird firstname.lastname@example.org Associate Publisher Glenn Silburn email@example.com Art Director/Production Manager Julie Wright Art/Production Tanya Scarselletti, Nettie Teuma, Colleen Sam
Head Office: Cnr Fox Valley Road & Kiogle Street (Locked Bag 1289), Wahroonga 2076 Australia Ph +61 2 9487 2700 Fax +61 2 9489 1265
Advertising Sales Liz Wilson Ph 0403 528 558 firstname.lastname@example.org
Glenn Silburn Ph 0422 931 499 email@example.com ASIA Lachlan Rainey Ph +61 (0) 402 157 167 firstname.lastname@example.org USA Huson International Media East Coast Ph +1 212 268 3344 West Coast Ph +1 408 879 6666 email@example.com
March 2013 Total CAB Audited Circulation (Aust + NZ) 7,626
Print Post Approved PP 100009359
All material published in this magazine is published in good faith and every care is taken to accurately relay information provided to us. Readers are advised by the publishers to ensure that all necessary safety devices and precautions are installed and safe working procedures adopted before the use of any equipment found or purchased through the information we provide. Further, all performance criteria was provided by the representative company concerned and any dispute should be referred to them. Information indicating that products are made in Australia or New Zealand is supplied by the source company. Westwick-Farrow Pty Ltd does not quantify the amount of local content or the accuracy of the statement made by the source.
ISSN 2201 - 148X
Printed and bound by Webstar +61 2 9748 0020
Circulation Manager Sue Lavery firstname.lastname@example.org Copy Control Mitchie Mullins email@example.com
UK Huson International Media Ph +44 1932 56 4999 firstname.lastname@example.org
w w w . t e c h n o l o g y d e c i s i o n s . c o m . a u
Published on Aug 12, 2013
Published on Aug 12, 2013
Published bi-monthly, Technology Decisions keeps senior IT professionals abreast of the latest trends, technology advances and application s...