How One City Embraced Virtualization As The Key To Success

How One City Embraced Virtualization as the Key to Success

The single most exciting thing you encounter in government is competence, because it’s so rare.

                                                                                               –  Daniel P. Moynihan (1927-2003), American politician.

You won’t normally associate government with speedy decision-making, especially as regards to the adoption of a new paradigm. Fortunately, things have been different as regards cloud computing and virtualization, especially for the Federal Government. Most of the Federal government’s enthusiasm about cloud computing have largely been an outcome of recently-departed Chief Information Officer (CIO) Vivek Kundra’s faith in the technology (The Architect of the Official Cloud Computing Revolution – CIO Vivek Kundra ). It was under his stewardship that the government released the official Federal Cloud Computing Strategy in February 2011 that stated “Cloud computing can significantly improve public sector IT”, and outlined the way to go about it.

However, it may surprise you to know that as far back as 2007, the City of Niles in Ohio had decided to replace its legacy IT infrastructure with a fully virtualized system. Today, even as many local governments struggle under unprecedented budget cutbacks, the City of Niles has found ways to increase revenue intake, improve city services, and support a growing business community, in large measure because of the decision taken six years ago.

These are some of the IT benefits the city has seen:

  • 70% reduction in system maintenance time, freeing staff for more valuable tasks

  • 99.7% reduction in unplanned system downtime, from 14 days a year to less than an hour

  • 15 minutes to roll out a new virtual machine, compared with 2–3 days previously for a physical server

  • Ability to support 50% annual data growth

  • 60% savings in storage space due to thin provisioning

For the city of 20,000 the aforementioned IT benefits have translated to real benefits on the ground:

  • Threefold increase in IT services offered to state employees and the community

  • Up to $8,000 saved for each new software rollout or upgrade

  • 40% increase in police patrol time due to streamlined online reporting

  • Projected 50% reduction in time to remotely monitor and maintain 911 system

  • Maximum IT availability to operate important city services

  • Increased revenue generation projected due to implementation of a smart power grid to optimize power usage

Read how a small city leveraged the latest in technology to emerge first among equals in this white paper titled Driving City Government Toward Improved Services.

The white paper is free to download, requiring only a 1-minute registration. If you have registered with CloudTweaks before, you don’t have to register again.

By Sourya Biswas

Sorry, comments are closed for this post.

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…