Amcom Provides Hosted Cloud Services to Australian University

Amcom Provides Hosted Cloud Services to Australian University

Amcom Telecommunications
has signed a $9 million contract to provide hosted Cloud services to The University of Western Australia (UWA).  The initial contract is for 3 years and has options for extending.
Under the agreement, Amcom will deliver its hosted Cloud solution to UWA that will benefit from hundreds of computer servers and more than 400 terabytes of storage. These computer servers and storage will be delivered across the company’s secure, reliable dedicated geographical path diverse 10‐gigabit fibre network between UWA and Amcom’s Data Centres.

Amcom has been able to provide us with a cost effective, secure, reliable and dedicated product that gives us capacity and capability across all faculties. It is both simple for us to manage and user friendly for our staff,” said Dr Mary Davies, UWA’s librarian and Director (Information Management).

Amcom is ready to deliver the hosted services we require now, and most important our data is stored in Perth using dedicated infrastructure (single tenant) under a private hosted services agreement. This puts us in the forefront of hosted compute and storage and frees us to concentrate on value added support for teaching, learning and research.”

The rapidly expanding global Cloud services market is providing customers with significant benefits of cost and scale, notes Amcom. Boasting an established customer base of 900 blue chip corporate and government customer, the company is ideally placed to leverage this emerging trend in the Cloud.

We are delighted to strengthen our partnership with UWA as one of Australia’s most prestigious universities,” said Amcom CEO Clive Stein.

Today we offer a comprehensive suite of IT solutions hosted in the Cloud to both new and existing customers and being chosen as a partner to one of Australia’s top universities to provide a dedicated, secure and reliable Cloud solution validates our services driven strategy.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Comics
How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…