Feeds

Building a private cloud

The MVA training course

  • alert
  • submit to reddit

Internet Security Threat Report 2014

For my last track, I chose Planning, building and managing a private cloud.

This is organised into three modules: Introducing a private cloud; Planning a private cloud; and Managing a private cloud.

The first module provided a very good overview of what cloud computing is, and more specifically the benefits of building a private cloud. It gave an overview of the different "as-a-service" categories of cloud computing and touched briefly on hybrid and public clouds.

But the message that cloud computing will not cost us our jobs is a bit awkward for me for a couple of reasons.

The first was that the module fell into the all too common trap of reaffirming the current industry line, "If you become really awesome at cloud computing, then you’ll be the guy they don’t fire!"

The second was that I sit in the category of IT professionals who are perhaps most concerned by cloud computing: small and medium enterprise sysadmins. Microsoft’s cloudy vision of the IT universe may preserve the total number of IT jobs across the industry. At the same time the job I currently occupy may become irrelevant. The kind of companies I work for are precisely the kind of companies the industry expects to see turning to the cloud.

Still, technically, Planning a private cloud is a great course. I got a wonderful idea of how to plan a Microsoft private cloud - for a company five times the size of the one I work for (and with eight times the budget). Caveats aside, the information in the planning module was comprehensive and I feel I am entirely up to the task should I ever need to plan such an environment.

The third module is all about Microsoft’s System Center suite of tools. This was a wonderful demo for me, because I don’t get to use these tools often. Sure, I’ve played with some of them, but I simply don’t work for the kinds of places that could afford the full blown suite of MS configuration tools.

That is the real focus of the module; the config tools. They certainly are nice. It’s quite amazing what you can do when you have the budget to do it right, and this module shows you just how far Microsoft’s virtualisation and configuration capabilities have come.

Professional interest in the subject matter aside, my experience with this track was tainted by my concern at the future of IT being intent on eliminating my job. But still, this track left me wanting more.

Trevor Pott is sysadmin based in Edmonton, Canada.

The Register is a media partner of Microsoft Virtual Academy.

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.