Hybrid Cloud a Viable IT Service Delivery Platform

Hybrid Cloud a Viable IT Service Delivery Platform

Hybrid cloud is a viable IT service delivery platform, according to Loughborough University.

The University collaborated with Logicalis UK to move a complete enterprise application stack back and forth between an on-campus private cloud and Logicalis’ hosted cloud, via JANET (Joint Academic Network).

The cloud solutions are based on Cisco’s unique Unified Computing System (UCS), NetApp Storage platforms, and CA Technologies’ automation and orchestration tools.

Loughborough notes that this alliance has also demonstrated the true capabilities of cloud as far more than just a hypervisor workload enabler.

For this project, Loughborough leveraged Logicalis’ innovation in cloud infrastructure and its connection into JANET, to automate a total infrastructure move between data centres located over 200 miles apart.

This automation, claims Loughborogh, was completed within minutes.

Loughborough University adopted Logicalis’ Cooperative Cloud as its strategic ICT platform in 2010. For the purpose, the company leveraged Logicalis’ JANET-connected hosted cloud as the institution needs new capacity in the future.

The University is now ready to quickly move real IT services between on-site private and off-site shared hosted clouds. Because Loughborough is using private cloud it has also been able to save more than £2million in data centre regeneration costs.

What we have achieved in this exercise rips up the rule book on what cloud means to customers. The industry has been so inwardly focussed on hypervisor-based clouds that it has forgotten that real organisations, like Loughborough, have a myriad of operating systems and workloads,” said Simon Daykin, CTO, Logicalis UK.

In successfully automating the move of an entire infrastructure and application stack in this way, we have proven that cloud is more than a vanilla slice of hypervisor paid for with a credit card.  This is not an engineering experiment; this is a real, live, demonstrable and adoptable approach for secure enterprise application cloud deployment.”

By Anuradha Shukla

 

Sorry, comments are closed for this post.

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…