Saturday, May 31, 2014

The Power Of Cloud Computing: Multi-Tenant Database Architecture

Software as a Service (SaaS) denotes a novel and innovative paradigm, and the fact that companies do not have to purchase and maintain their own Information Technology (ICT) infrastructure; instead services from third party are acquired. Multi-tenancy permits SaaS providers to provide similar service to various customers (tenants), which share physical and/or virtual resources transparently.
Multi-tenancy database architecture essentially forms a design in which a single instance of the software is run on the service provider’s infrastructure, and multiple tenants access the same instance. Simply put “A multi-tenant application lets customers (tenants) share the same hardware resources, by offering them one shared application and database instance, while allowing them to configure the application to fit their needs as if it runs on a dedicated environment”. One of the most conspicuous features of Multi-tenant architecture is that allows for consolidating multiple businesses onto the same operational platform or system. Multi-tenancy invariably takes place at the database layer of a service. As an analogy, think of a rental apartment building with numerous tenants, each having its own requirement of storage, space, and utilities.
Easier application deployment for service providers, improved rate of hardware utilization, and reduction in overall costs especially for SMEs are core benefits of Multi-tenant model. In traditional single-tenant software development, tenants usually have their own virtual server. This set-up is similar to the traditional Application Service Provider (ASP) model. However, in the SME segment, for instance, server utilization in such a model is low. By placing several tenants on the same server, the server utilization can be improved.
There different kinds of Multi-tenant models that exist in database applications today are as follows:
1.   Separate application, separate database, and infrastructure (Isolated Tenancy)
2.   Separate application, separate database, shared infrastructure (Infrastructure Tenancy)
3.   Shared application separate database, shared infrastructure (Application Tenancy)
4.   Shared application, shared database, shared infrastructure (Shared Tenancy)
The figure below illustrates a high level architecture of Multi-tenancy. Multi-tenant approaches as a continuum paradigm. The far left (Isolated Tenancy) depicts each tenant with its own application instance running and as we move further towards the right, sharing of tenancy increases, ultimately reaching the far right side (Shared Tenancy)
multi-tenancy-application-architecture
Multi-tenancy application architecture

e-Discovery and | cloud computing
New Jersey, USA | Lahore, PAK | Dubai, UAE
www.claydesk.com
(855) – 833 – 7775
(703) – 646 - 3043

Friday, May 16, 2014

What’s Wrong with Outsourcing? Really?

A company’s existence is directly linked to its profit-making capabilities. This includes employing the most gifted workforce, running optimized operations, having excellent quality controls in place, just to name a few. There is an invisible force, however, constantly acting behind this entire process - the force of 'laws of economics' - principles of demand and supply.
The word ‘globalization’ is not a new buzz word anymore. However, its relation to economics is where the dilemma of outsourcing and offshoring lies. Gone are the days when corporations had loyal employees working for them, the technological advancement has disrupted not only how we work but how we think – Yes! We think GoogleFacebookLinkedInTwitter, and for the most part have become dependent upon technology.
So, what impact does technology have on driving profits for a company? Look around you – things have changed, human behavior has changed, our thinking process has changed – we have become victims to this unstoppable monster.  As the Greek philosopher, Heraclitus, rightly said “There is nothing permanent except change”. As a result, companies who adapt to the changing environment remain at the forefront, and those who resist potentially may bear the grunt. In any case, the objective remains to make profits for shareholders.
We all are aware of the exponential growth of technological innovations and big data. What should companies do to maximize their profits in this dynamic environment? Outsourcing seems to be the logical solution. The single biggest advantage is reduction in existing costs. Consider a simple scenario related to e-Discovery industry:
Company A is looking to hire Document Review Attorney for its e-Discovery project. What could possibly be the lowest per hour rate for a first pass review? How does 20 dollars per hour sounds! In today’s economy, believe it or not, you will find qualified, experienced, and certified individuals who would be willing to work. In the US, this rate is certainly peanuts for an attorney, but in India, Pakistan, Philippines, and Bangladesh, for example, 20 dollars per hour would fetch a luxury lifestyle.
With the advent of cloud computing, developing countries now have access to all the latest technologies, learning tools, methodologies, norms, usages etc. Workforce has truly become global and cloud computing is driving costs further down. As buyers influx the marketplace searching for low priced efficient technologies, sellers lower their costs to remain competitive. Consequently, companies may not afford or attract high paid workers. To bridge the gap, various outsourcing models fit the puzzle, providing same services at a drastically reduced price. Companies now have access to equally qualified workforce available in the cloud. To top it off, Ivy League universities now offer Bachelors and Masters level degrees online. So, for example, I could obtain an MBA degree from an Ivy League business school, while residing anywhere in the world, and provide expertise on a project via the cloud.
Having said that, profitability, principles of demand and supply, and cloud computing technologies are factors exerting pressures on US companies to find alternative ways to increase profitability. Microsoft and Amazon provide secure state-of-the-art data storage centers, and with SaaS, PaaS, and IaaS technologies, allowing for data security. A good example is of WordPress – majority of their employees are virtual. Similarly, Microsoft with its launch of Office 365 and allied products is evidently cloud based, and a qualified professional could administer, manage, and support Office 365 from anywhere in the world!
outsourcing
Outsourcing

e-Discovery and | cloud computing
New Jersey, USA | Lahore, PAK | Dubai, UAE
www.claydesk.com
(855) – 833 – 7775
(703) – 646 - 3043

Thursday, May 8, 2014

7 Tips for Implementing E-Discovery Best Practices

E-Discovery best practices begin with making data management as part of daily routine and business operations. Attorneys cannot achieve this objective without the help of IT department, and IT personnel cannot properly maintain data without guidance from attorneys about what should be kept or destroyed. Federal Rules of Civil Procedure related to e-Discovery and keeping up with changing law in the area is a good start, however, knowing and understanding how to put these lessons to practically work in practice is the key to implementing and conducting e-Discovery successfully.
Planning ahead plays a pivotal role as it sets the standard for effective relationships between internal and external legal and technical resources. Below are few tips for implementing effective best practices for both inside and outside counsel.
  1. Be proactive and have a formal document retention policy in place with rules for saving and destroying electronic documents.
  2. Increase company-wide awareness of litigation readiness, and train employees to organize documents in an organized manner. Better yet, implement an effective document management solution such as M-Files – which includes e-compliance module.
  3. Effectively cater to big data and effectively implement strategy for later archival, identification, and production in a timely fashion.
  4. Train IT personnel to act as a deposition witness as per rule 30(b)(6).
  5. Preserve potential evidence when necessary while effectively train and involve key legal and IT personnel as soon as litigation is imminent.
  6. Must have adequate knowledge about client’s information systems and operations to effectively define e-Discovery parameters, ensuring smooth functioning with opposing counsel. Try to minimize disruption of clients operations.
  7. When a document request is received, be a partner in the data retrieval process – not just a messenger.
While harmony, effective communication, and smooth functioning between attorneys and IT personnel can prove to be beneficial for the organization, keeping current with latest technology and how it can streamline the e-Discovery process is equally important. After all, the purpose of technology is to act as a tool to handle complex e-Discovery in a speedy and cost efficient manner.
e-Discovery best practices
e-Discovery best practices

e-Discovery and | cloud computing
New Jersey, USA | Lahore, PAK | Dubai, UAE
www.claydesk.com
(855) – 833 – 7775
(703) – 646 - 3043