Premium Content

Access "Using automation, self-service provisioning to build a private cloud"

Daniel Eason, Contributor Published: 21 Jan 2013

IT pros who understand the benefits of cloud computing are assessing if they can build a private cloud behind closed doors for additional security. Incorporating cloud automation, self-service provisioning and integrating IT management tools will help make their private cloud project a success. With a private cloud infrastructure, an organisation can maximise the use of IT resources and save costs while introducing self-service capabilities and empowering end users. A private cloud makes IT more efficient and frees up IT pros for more strategic tasks than just managing servers. Another popular use for a private cloud is to host testing and development applications, according to TechTarget’s UK and Europe Virtualisation Decisions survey of 2011. Self-service provisioning and cloud automation capabilities Server virtualisation is the key ingredient for building a private cloud. A pool of infrastructure resources provide the elastic characteristics of a cloud service, so it’s important to have a virtual estate which has dynamic resource balancing and management... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...