Amazon and 3DS Team on Delivering Cloud-Based Applications

Amazon and 3DS Team on Delivering Cloud-Based Applications

Dassault Systemes (3DS) and Amazon Web Services (AWS) have teamed to enable companies of all sizes to get started quickly with 3DS Version 6 solutions on AWS.

Amazon Web Services (AWS), an Amazon.com company, delivers elastic cloud infrastructure. Dassault Systemes (3DS) specializes in 3D and Product Lifecycle Management (PLM) solutions. Both partners are collaborating to address the burgeoning demand by organizations to leverage cloud technologies to more efficiently deploy, maintain, and access 3D, Product Lifecycle Management and solutions.

Dassault Systemes offers a platform that can be used for various purposes: run lifelike experiences, reveal smart information, enable social innovation, imagine with 3D and structure companies’ assets and operations to execute to excellence. This platform is powered by Version 6 technologies, and delivers simple mechanisms to configure on-the-fly, extend with mash-up capabilities, and develop new applications and experiences.

Following this announcement, Version 6 solutions are offered in 3DS experiences store and on AWS to the global market.

According to Dassault Systemes, the company is utilizing the Amazon Elastic Compute Cloud (Amazon EC2) to provide discrete compute environments for each customer.  This provides a preconfigured environment for companies to run 3D, PLM and lifelike experience. It is also leveraging the AWS global footprint to provide the best experience for their customers, regardless of their physical location.

Moving PLM to the cloud is a giant step in giving back our customers the freedom, the power and the agility that they have been longing for. Amazon Web Services made it possible thanks to the quality of its global, reliable, scalable and cost-effective cloud infrastructure,” said Bernard Charles, president and CEO, Dassault Systemes.

Dassault Systemes is a pioneer in 3D and PLM solutions. This new offering will enable our joint customers to more easily collaborate on complex, globally distributed, product designs and plans,” said Andy Jassy, senior vice president, Amazon Web Services. “We are extremely pleased to work with Dassault Systemes to help them deliver innovative cloud based solutions to the market.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…