Access "In-house vs. moving to the cloud: Data centre learning guide"
This article is part of the February 2012 issue of How to build an internal, private cloud
When deciding between keeping IT infrastructure in-house or moving to the cloud, important questions are bound to surface about scalability, flexibility and security. This in-house versus moving to the cloud data centre guide explores the benefits and drawbacks of each approach across three factors: Cost: Moving IT infrastructure to the cloud helps avoid some capital investment such as designing, building and managing a data centre in-house. But a flawed contract with a cloud provider could lead to high operating expenses, experts warn. Security: Securing an in-house data centre can be expensive for smaller organisations. But, organisations with a robust in-house IT infrastructure will find it worthwhile to make this additional investment and retain the data centre because cloud security depends upon the infrastructure and the services they make available to clients. There is often little room to alter the cloud service-level agreements (SLAs). Performance, reliability and scalability: Moving to the cloud and using software, platform and infrastructure as a ... Access >>>
Premium Content for Free.
Using automation, self-service provisioning to build a private cloud
by Daniel Eason, Contributor
IT pros that recognise cloud computing benefits want to build one behind closed doors. But a private cloud requires automation, self-service provisioning and management planning.
- Using automation, self-service provisioning to build a private cloud by Daniel Eason, Contributor
In-house vs. moving to the cloud: Data centre learning guide
by Archana Venkatraman
Moving IT to the cloud can have certain advantages such as scalability and flexibility, but in-house data centres score on security aspects.
- In-house vs. moving to the cloud: Data centre learning guide by Archana Venkatraman
More Premium Content Accessible For Free
In this 11-page buyer’s guide, Computer Weekly looks at how to meet the challenge of ensuring that mobile devices comply with your enterprise’s ...
This extract from Sharon Conheady’s book, Social Engineering in IT Security, gives an overview of Social Engineering techniques and explains how ...
It is time to revisit out-of-date policies and strategies to avoid minor issues becoming major disasters, say Gartner analysts Saul Judah and Andrew ...