Feeds

Roll up to the great Register Private Cloud survey

Buddy, can you spare some time?

  • alert
  • submit to reddit

Remote control for virtualized desktops

Research The Register has constructed a lovely survey about Private Cloud, which will form the basis of a number of research-based articles to be published in coming weeks. The survey is a one-pager and will take a few minutes of your time. Please take part!

Here's some background to our thinking. Without getting bogged down in definitions, the basic idea of Private Cloud is to implement an architecture within your data centre (or on kit dedicated to you that’s co-located in someone else’s data centre) that allows physical resources such as servers and storage devices to be treated as one big flexible pool of reusable compute power and storage capacity.

Appropriate resources are allocated to specific workloads as you throw things at your private cloud, and they can later be de-allocated and reassigned to other work as demands change.

Easy to say, but the Devil is in the detail, and as Reg readers are not best known for accepting big ideas and grand designs on face value, we want to get into some specifics in our latest survey.

As it turns out, if you put all of the jargon to one side, you can deconstruct the concept of private cloud into a number of precise capabilities that pretty much anyone can get their brain around. It’s not magic, it’s mostly about trying to automate some of the traditionally onerous and constraining aspects of server provisioning and workload management.

The question though is where private cloud capabilities fit, or potentially fit, into your overall IT environment, and the practicalities involved in getting it all to work effectively to create some actual benefit. We are hoping that by tackling the topic in a more precise and specific manner, pretty much anyone should be able to provide a view.

So, whether you know about private cloud or not, or are in the process of getting up to speed, we’d like you to take part in our survey. And feel free to tell us if we are missing the point or being too assumptive with any of the questions. You can get started by clicking the button below.

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.