Access "Using automation, self-service provisioning to build a private cloud"
This article is part of the February 2012 issue of How to build an internal, private cloud
IT pros who understand the benefits of cloud computing are assessing if they can build a private cloud behind closed doors for additional security. Incorporating cloud automation, self-service provisioning and integrating IT management tools will help make their private cloud project a success. With a private cloud infrastructure, an organisation can maximise the use of IT resources and save costs while introducing self-service capabilities and empowering end users. A private cloud makes IT more efficient and frees up IT pros for more strategic tasks than just managing servers. Another popular use for a private cloud is to host testing and development applications, according to TechTarget’s UK and Europe Virtualisation Decisions survey of 2011. Self-service provisioning and cloud automation capabilities Server virtualisation is the key ingredient for building a private cloud. A pool of infrastructure resources provide the elastic characteristics of a cloud service, so it’s important to have a virtual estate which has dynamic resource balancing and management... Access >>>
Premium Content for Free.
Using automation, self-service provisioning to build a private cloud
by Daniel Eason, Contributor
IT pros that recognise cloud computing benefits want to build one behind closed doors. But a private cloud requires automation, self-service provisioning and management planning.
- Using automation, self-service provisioning to build a private cloud by Daniel Eason, Contributor
In-house vs. moving to the cloud: Data centre learning guide
by Archana Venkatraman
Moving IT to the cloud can have certain advantages such as scalability and flexibility, but in-house data centres score on security aspects.
- In-house vs. moving to the cloud: Data centre learning guide by Archana Venkatraman
More Premium Content Accessible For Free
Lack of diversity in software and operating systems over many years has left a large number of computers vulnerable to memory program attacks. A ...
This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a ...
IT decision makers are using social media effectively at work, but marketers are playing catch up, according to this research snapshot.