Silicon Graphics International Offers Free Cloud Computing In Japan

SGI Offers Free Cloud Computing in Japan

In an attempt to provide relief to earthquake and tsunami stricken Japan, SGI is making available its SGI Cyclone Technical Computing Cloud services free of charge for up to ninety days, to customers in this island nation.

With this initiative, the technical computing specialist is enabling businesses in Japan to gain immediate access to technical computing via SGI Cyclone.  Customers who require immediate access to large-scale on-demand cloud compute resources can use Cyclone to transition their workloads and data to SGI Cyclone over the Internet.

Those interested to know more about this offer may contact the SGI Japan office at +81-3-5488-1811.

SGI is focused on helping customers solve their most demanding business and technology challenges. Commenting on this move its CEO Mark J. Barrenechea said: “Our hearts and condolences go out to those affected by the tragedy in Japan. The SGI commitment to our Japanese customers remains steadfast and we are ready to help in any way possible.

By offering free access to SGI Cyclone, we can assist organizations that may have lost capabilities or are experiencing unpredictable circumstances, allowing them to restart critical aspects of their business more quickly and reliably.”

Businesses throughout Japan are dealing with significant challenges,” said Nobuhiko Nakatsu, president of SGI Japan. “Our first priority is our customers and others we may be able to assist, and we stand ready with SGI Cyclone to aid those who can utilize this service to help rebuild their businesses effectively and efficiently.”

Capitalizing on over twenty years of SGI technical computing expertise, Cyclone, the cloud computing offering addresses markets that require high-end computational hardware, software and networking equipment to achieve rapid results.  Cyclone can be used for technical computing applications including computational biology, computational chemistry and materials, computational fluid dynamics, finite element analysis, and computational electromagnetics.

By Anuradha Shukla

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…