Recent Cloud Computing Team Ups – I

Recent Cloud Computing Team Ups – I

“The way a team plays as a whole determines its success. You may have the greatest bunch of individual stars in the world, but if they don’t play together, the club won’t be worth a dime.”
– Babe Ruth (1895-1948), American baseball legend.

The above quote coming from someone who personalized individual achievement speaks volumes about the importance of teams. Working in teams is one of the defining characteristics of modern business, and this is not restricted to working within organizations only. Even across companies, teams have been able to leverage multiple competencies to deliver astounding results. That is why even rivals like Toyota and General Motors have embraced this concept. As regards teamwork, the sum is certainly more than the parts. With this in mind, it is not surprising that team ups have begun to emerge in the cloud computing space.

Today’s article focuses on three recent ones.

Red Hat and Science Applications International Corporation (SAIC)

Red Hat took a major step towards its projected billion dollar revenue mark (See: Red Hat Aims For One Billion Revenue Mark on Cloud Computing Growth ) when it announced an agreement with Virginia-based defense contractor SAIC to use Red Hat’s offerings in SAIC’s new Advanced Computer Engineering (ACE) Laboratory in South Carolina. Products and services that are part of this deal include Red Hat Enterprise Linux, JBoss Enterprise Middleware, Red Hat Enterprise Virtualization, systems management technologies, Red Hat CloudForms (See: Red Hat CloudForms Infrastructure-as-a-Service: Build Clouds Without Limits), and the company’s OpenShift PaaS platform.

As per the press release, the ACE Laboratory is intended to provide “physical and virtual environments for hands-on collaboration between SAIC, other contractors, small businesses, information technology vendors and government employees.” Areas expected to be covered include cloud computing best practices and low-cost, enterprise-scale “create once, optimally manage and reuse often” solutions. With the US military actively looking at cloud computing (See: US Military Asks for Private Sector’s Help to Understand Cloud Computing), this partnership may have a lot of potential.

Red Hat has a longstanding relationship with SAIC to provide open source technologies and methodologies on large programs in the federal government, dating back to our first master marketing agreement in 2006. This most recent iteration capitalizes the widespread use by cloud providers of open source architectures to deliver services. Red Hat is a leading provider of supported, secure and scalable products for both IaaS and PaaS,” said Paul Smith, Red Hat’s vice president and general manager of public sector.

Using our ACE Lab, SAIC experts work with customers to develop advanced engineering solutions for some of our nation’s most significant cyber and software challenges. With Red Hat on our team, we’re continually finding ways to use our expertise to help keep customers a step ahead of the curve when it comes to cloud computing,” said Jim Thigpen, SAIC senior vice president and business unit general manager.

By Sourya Biswas

Sorry, comments are closed for this post.

Are you SURE you are ready for the cloud?

Are you SURE you are ready for the cloud?

Ready For The Cloud? For several years now, people and organizations have been slowly but surely moving their data and applications to the cloud. Whether it is a local private cloud, Hybrid or a fully hosted one, they all have one thing in common: They are no longer tied to physical hardware. That is how…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

The True Power And Potential Of Wearables

The True Power And Potential Of Wearables

The Power of Wearables The potential of wearable computing for efficiency and innovation is enormous. For business leaders and CIOs, wearable technology represents an opportunity to find more intelligent solutions to real problems and to leverage these devices for the benefit of the organization. But before wearables can successfully realize these expectations, there remain basic…

Who’s Ready For The Cloud, And Can Deliver!

Who’s Ready For The Cloud, And Can Deliver!

Cloud Ready In my article last month, I discussed how the managed service provider (MSP) industry has been continuously urged to embrace the cloud, but in the end, could they? I answered the questions by describing several impediments and challenges that I believe are preventing MSPs from generating significant revenue and successfully fulfilling their client’s…

The Cloud Showdown: How To Determine The Best Cloud Solution For Your Business

The Cloud Showdown: How To Determine The Best Cloud Solution For Your Business

The Cloud Showdown For small and medium businesses (SMB) seeking to grow in 2016, options for increasing efficiency abound. The Cloud offers many benefits for businesses, including slashing IT expenses, providing a more efficient and reliable way to store and back up data, and facilitating collaboration among employees. In fact, 39 percent of SMBs claim…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

The Concept Of Securing IoT To Secure Your Building

The Concept Of Securing IoT To Secure Your Building

Securing IoT Ah, security. It is the dulcet tone of a symphony that we play over and over in the IT world. IoT (Internet of Things) and the myriad of connected devices allow us some intriguing security options. For example, in a mesh array of sensors, you could effectively force users to correctly identify themselves…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor