Evolution Systems Builds Cloud with Red Hat

Evolution Systems, a Sydney, Australia-based full service IT support business, is using Red Hat Solutions to build its cloud service offering. The Evolution Cloud service is built leveraging a combination of Red Hat Enterprise Linux 5.6 and Red Hat Enterprise Virtualization 2.2.  This offering has enabled many customers to achieve new levels of scalability, performance and flexibility, says Red Hat, a global provider of open source solutions.

Evolution Systems launched its cloud services offering earlier this year to set up an environment that could be quickly virtualized at a low cost. The company aimed to sell virtualized servers and storage at a competitive price and in order to do so it wanted a scalable technology foundation that could provide fast deployment at an affordable price.

Evolution Systems realized that it wanted a virtualization solution to address its requirements and evaluated available options in the market including solutions from Red Hat and VMware.

The beauty of working with Red Hat technology is that it makes our offering a more attractive cloud option for customers because of our ability to provide scalability and flexibility,” said Geoff Boreland, managing director at Evolution Systems. “Red Hat Enterprise Linux and Red Hat Enterprise Virtualization enable us to offer a stable and secure environment for customer data and provide us with cost savings that we can pass directly on to our customers.”

We’re confident in Red Hat and its technology solutions, and we’re effectively betting our cloud business on these technologies because they’re the foundation of what we offer. We know that at the end of the day, our customers want their data stored, and they want it stored safely and securely. With Red Hat as the basis of our cloud service, we have the tools to help us deliver that,” added Boreland.

By Anuradha Shukla

About CloudBuzz

Discover some of the top aggregated and curated technology news stories from around the world under the CloudBuzz authorship.

Catchup on trending stories related to Big Data, Cloud Computing, Wearable Technology, Internet of Things, Virtual Reality, Mobile Technologies and much more from some of the top information sources.

Find out more
View All Articles

Sorry, comments are closed for this post.

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

IoT (Internet of Things) – Don’t Forget The Milk

IoT (Internet of Things) – Don’t Forget The Milk

Don’t Forget The Milk More on the Internet of Bling and some thoughts on the IoT of tomorrow… Last month I talked about the wearable IoT concept of the Internet of Bling. So what is more fashionable than an LED that blinks different colors based on the ambient temperature of the room? Blue when the…

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

‘Tis The Season To Be Deploying Sensors

‘Tis The Season To Be Deploying Sensors

Deploying Sensors Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising