Feeds

CA, Unisys bring “private cloud” partnership to Oz

Cloud crowd more crowded

Top three mobile application threats

Unisys and CA, which earlier this year announced that they would offer joint cloud services in North America, are planning a rollout in Australia.

The joint services combine CA’s various management products with advisory, planning, design and implementation services from Unisys.

Unisys’ Asia-Pac director for data centre transformation Paul Allen sought to distance the joint offering from the existing CA-Fujitsu cloud services, saying that Unisys had a greater focus on the “private cloud”.

Speaking to a media lunch at CA World Expo in Sydney yesterday (July 25), CA’s VP of strategic solutions Andi Mann noted that enterprises that try to build a private cloud as a DIY project bump into a host of unexpected challenges, many of them legal or administrative rather than IT-related.

For example, there’s licensing: an enterprise’s existing software licenses may be too restrictive or a cloud environment, or at least place new demands on the internal processes the company uses to account for its licenses. “If you are dynamically allocating processes, you have to dynamically allocate those licenses,” Mann said – and you need to be able to account for those license allocations.

SLA management is also likely to come under the spotlight, particularly at the interface between the cloud environment and the telco links that deliver the services. Because carriers remain reluctant to provide back-to-back SLAs with independent cloud providers – particularly as they join the rush into cloud services in their own right – Mann said the ability to “measure everything” and identify external influences on service quality becomes critical.

Allen said that the Australian move is part of a wider push, both into the Asia Pacific and worldwide. Rather than trying to take the whole world by storm, he said the two partners were taking a more incremental approach to the international market.

In an earlier speech to the CA World Expo, Fujitsu Australia's CTO and executive general manager for marketing, Craig Baty, nominated Australia as a possible target for the expansion of the company's Azure-based cloud services. ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.