How One City Embraced Virtualization As The Key To Success

How One City Embraced Virtualization as the Key to Success

The single most exciting thing you encounter in government is competence, because it’s so rare.

                                                                                               –  Daniel P. Moynihan (1927-2003), American politician.

You won’t normally associate government with speedy decision-making, especially as regards to the adoption of a new paradigm. Fortunately, things have been different as regards cloud computing and virtualization, especially for the Federal Government. Most of the Federal government’s enthusiasm about cloud computing have largely been an outcome of recently-departed Chief Information Officer (CIO) Vivek Kundra’s faith in the technology (The Architect of the Official Cloud Computing Revolution – CIO Vivek Kundra ). It was under his stewardship that the government released the official Federal Cloud Computing Strategy in February 2011 that stated “Cloud computing can significantly improve public sector IT”, and outlined the way to go about it.

However, it may surprise you to know that as far back as 2007, the City of Niles in Ohio had decided to replace its legacy IT infrastructure with a fully virtualized system. Today, even as many local governments struggle under unprecedented budget cutbacks, the City of Niles has found ways to increase revenue intake, improve city services, and support a growing business community, in large measure because of the decision taken six years ago.

These are some of the IT benefits the city has seen:

  • 70% reduction in system maintenance time, freeing staff for more valuable tasks

  • 99.7% reduction in unplanned system downtime, from 14 days a year to less than an hour

  • 15 minutes to roll out a new virtual machine, compared with 2–3 days previously for a physical server

  • Ability to support 50% annual data growth

  • 60% savings in storage space due to thin provisioning

For the city of 20,000 the aforementioned IT benefits have translated to real benefits on the ground:

  • Threefold increase in IT services offered to state employees and the community

  • Up to $8,000 saved for each new software rollout or upgrade

  • 40% increase in police patrol time due to streamlined online reporting

  • Projected 50% reduction in time to remotely monitor and maintain 911 system

  • Maximum IT availability to operate important city services

  • Increased revenue generation projected due to implementation of a smart power grid to optimize power usage

Read how a small city leveraged the latest in technology to emerge first among equals in this white paper titled Driving City Government Toward Improved Services.

The white paper is free to download, requiring only a 1-minute registration. If you have registered with CloudTweaks before, you don’t have to register again.

By Sourya Biswas

Sorry, comments are closed for this post.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Cloud Infographic – Interesting Big Data Facts

Cloud Infographic – Interesting Big Data Facts

Big Data Facts You Didn’t Know The term Big Data has been buzzing around tech circles for a few years now. Forrester has defined big data as “Technologies and techniques that make capturing value from data at an extreme scale economical.” The key word here is economical. If the costs of extracting, processing, and making use…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…