Red Hat Brings Cloud Scale and Agility to the Data-Tier

Red Hat Brings Cloud Scale and Agility to the Data-Tier

Open source solutions provider Red Hat has announced the launch of a cloud-ready, highly scalable distributed data cache.

Known as JBoss Enterprise Data Grid 6, the new release can deliver a range of benefits such as easing the load on database servers, reduction of response times in applications, and providing additional failure resilience.

According to Red Hat, the new data cache will initially be available through an Early Access Program.

Elaborating on the rationale of the release, the company says that today it has become challenging for organizations to scale the data-tier due to technical and economic issues

Typically, scaling up requires additional hardware and database software licenses, and scaling out involves complex data partitioning or clustering technologies.

JBoss Enterprise Data Grid has the ability to deliver highly resilient and transactional data access with the agility and economic benefits of cloud computing.

This product has been designed from the core to support cloud-scale computing with concepts such as multi-tenancy, elasticity and distributed code execution. Enterprises deciding to use this product will be able to tap those capabilities in order to deploy highly available, massively scalable and highly performant shared data grids to accelerate applications and curtail data-tier costs.

Data grids are an inherently scalable solution for increasing throughput, resilience, and lowering response times of the data tier,” said Craig Muzilla, vice president and general manager of middleware business at Red Hat. “From clustering to vertical scaling and positioning, data grids present an opportunity for significant cost advantages over other data-scaling approaches.”

Red Hat claims that JBoss Enterprise Data Grid is part of the company’s vision to redefine middleware.

This product will also provide a comprehensive, open source distributed service fabric to help developers and organizations build, deploy and manage applications in the cloud.

Read: The RedHat Cloud Quick Start

By Anuradha Shukla

Sorry, comments are closed for this post.

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…