Welcome!

Agile Computing Authors: Liz McMillan, Pat Romanski, Elizabeth White, Dana Gardner, Andy Thurai

Related Topics: @CloudExpo, Java IoT, Microservices Expo, Containers Expo Blog, Agile Computing, SDN Journal

@CloudExpo: Article

Cloud Computing: Impact of Comcast’s Acquisition

Cloud computing applications should be connected to two separate network carriers to avoid a single point-of-failure

COMCAST's recent $45 billion acquisition of Time-Warner Cable was big news in the Cable TV world, but it should be big news in the area of cloud computing and network diversity.

Instead of looking at COMCAST as a cable TV provider, it is time that we should be looking at it as another alternative to the traditional network carriers like AT&T and Verizon for our data needs both at home and at the business location.

Re-Thinking Cloud Computing Strategy
Do you have network redundancy in place in your cloud computing applications? They cannot be considered "mission critical" if you only have them running on one connection to the central office.

Ninety-nine percent of the commercial buildings are still in the horse-and-buggy days of having one main connection to one central office of the phone company for connectivity. Corporate tenants who have mission-critical applications should be using more than one network access point for their core business applications as well as a secondary network carrier with a totally separate network topology. If you aren't, you have a huge single point-of-failure embedded in your network and are not even close to having something reliable.

It's time to move forward from the horse-and-buggy days and start adding redundancy to all networks that carry any applications that you consider mission critical. If you work from home, that connection to your customer base is also mission critical.

New Competition or No Competition?
Maybe the incumbent network carriers like AT&T and Verizon don't look at COMCAST as being a real competitor because its focus is more on cable TV, but in reality, the network grid that COMCAST has could go head-to-head in markets where incumbents like AT&T provide U-Verse.

Did you know if you get U-Verse, you cannot get a second high-speed U-Verse line? I found that out recently and could not believe how short-sighted that is from a marketing strategy standpoint. It leaves AT&T wide open for someone like COMCAST to come in and provide a second line for work-at-home couples. This was our solution when AT&T could not ante up a second line.

This raises a huge question as to the available network resources AT&T has in the street. If their policy is to not provide a second line, it means it doesn't have enough network capabilities in the street.

Look at COMCAST as another alternative when you start to build redundancy and resiliency into your networks.  Broaden your perspective when it comes to identifying solutions for network infrastructure challenges.

•   •   •

Carlini's book, "Location, Location, Connectivity" will be coming out later this year.

Follow daily Carlini-isms at www.TWITTER.com/JAMESCARLINI

Copyright 2014 - James Carlini

More Stories By James Carlini

James Carlini, MBA, a certified Infrastructure Consultant, keynote speaker and former award-winning Adjunct Professor at Northwestern University, has advised on mission-critical networks. Clients include the Chicago Mercantile Exchange, GLOBEX, and City of Chicago’s 911 Center. An expert witness in civil and federal courts on network infrastructure, he has worked with AT&T, Sprint and others.

Follow daily Carlini-isms at www.twitter.com/JAMESCARLINI

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


IoT & Smart Cities Stories
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.