Feeds

The to-do list to make private cloud work

Unified infrastructure management

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

Broadcast Change is the hardest thing that IT has to do, but it's a fact of life. How you deal with fundamental change can have a massive impact on the overall performance of the business, on user satisfaction and on how IT is valued. This is particularly true when there are a whole bunch of complex systems in place. You've just got them working, or at least stopped people complaining too much. Suddenly there's a new big idea, and a new set of tools and change management processes to consider.

Get private cloud right, and the rewards are plentiful – a much more effective use of the IT infrastructure and assets, a better performing business and happier users. But get it wrong and things may spiral out of control – where IT is not able to move with the business it risks being cut out of the loop as external services become ever easier to access.

If you're finding it's taking a bit too long to respond, or that things break when changed or just that there are too many things going on to try to deal with it all, then you need to consolidate and integrate the way you handle change. Building an end-to-end service management system may not be on the cards, but there is still a lot that can be done right now to tie things together. Live on February 28th at 16:30 GMT/08:30 PST The Register’s Tim Phillips is joined by Freeform Dynamic analyst Andrew Buss and CA Technologies’ Patrick Ancipink to go through the top of that to-do list. They will look at unifying the building blocks of the data centre – servers, storage and networking. Our experts will share best practices on how these things can work together rather than requiring three separate systems and teams to make change happen.

Join in the live discussion by sharing your own to-do list for making private cloud work in your business. We want to hear your experiences – what is working and what needs improving through the event’s Q&A window. You can register for this free event here and also get access to our on-demand version if you are unable to make the live event.

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.