Feeds

Hard-up Big Biz's docs lobbed into cheap cloud

EMC OnDemand forced to go virtual

Internet Security Threat Report 2014

EMC has countered claims that the price of its enterprise-grade document handling software exceeds business value – by offering them as on-demand cloud services.

Customers tap into the content management services from whichever gadget is to hand by accessing an on-premise installation managed by EMC or an off-premise setup in a cloudy data centre. It is a hybrid cloud deployment model.

There are three services:

  • EMC OnDemand for Captiva for scanning and document capture;
  • OnDemand Document Sciences for automated document mailing; and
  • OnDemand Documentum for content management.

These run in so-called Virtual Cubes, which are software corrals fashioned using EMC, RSA and VMware components. The front-end to the VCUBEs is used by an OnDemand administrator, and each VCUBE can run one or more applications

EMC's Andrew Chapman, senior director for product management of the OnDemand products, said of the three base products – Captiva, Document Sciences, and Documentum: "They were not [originally] designed for the cloud and multi-tenancy." By running them in VCUBEs they are isolated from each other and operate safely and securely within a multi-tenancy environment.

The OnDemand infrastructure can contain one or several EMC and EMC partner products and is said to be completely portable from one data centre to another.

Customers can provision the services themselves, meaning an entire customer environment with multiple application instances for production, test and development. Captiva provisioning takes less than two hours and Documentum up to six. Chapman said that would probably come down towards two hours next year.

Customers will be charged on a consumption basis and get their service up and running much faster than a traditional CAPEX purchase-based implementation.

Melissa Webster, an IDC veep, said in a canned quote: "We think this could significantly change the total cost of ownership (TCO) equation for EMC's Information Intelligence Group products."

The IIG products have not been as popular with EMC's customers as many of its other products; EMC hopes that offering them as a cloud-based service will make them more affordable and their value will shine through. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.