Feeds

Singtel to build pan-Asian storage and compute cloud

VMware in the box seat in Oz, Singapore and Hong Kong

High performance access to file storage

Singtel will federate its hosting facilities across Asia to create a single cloud for its customers.

The company appears not to be taking the full public cloud plunge, announcing yesterday that it will “launch a regional PowerON Compute cloud service in the second half of this year.“ The new offering “will enable customers with regional operations to access virtual capacity across multiple clouds, but manage their resources from a single portal” and will mean ”Customers can look forward to a seamless regional cloud offering that will make it easier to manage their cloud resources- that‟s one contract, one bill and one management portal, with access to multiple clouds across the region,” said John Paitaridis, Managing Director, of Optus Business, Singtel's Australian outpost. The clouds will reside in Sydney, Hong Kong and Singapore.

Details are thin about just what will be on offer, but officials said customers will be offered the chance to “get apps closer to their customers” thanks to replicated data centres that will make application porting easy. But officials stopped short of saying customers would be able to shunt workloads between Singtel locations, shaking heads at our mention of vMotion at a Distance while confirming that VMWare's vCloud Director will likely hum away behind the scenes.

The company will also introduce a cloud storage service, offering a virtual SAN and generic cloud storage. Details are still skimpy, but the offering again seems tuned to deeper engagements than casual credit-card-based accounts.

At the Sydney event where PowerON was discussed, the company also launched a range of mobility management services it hopes will help buyers to surf the BYOD wave. Managed mobility services will see Android, Blackberry and Windows Phone devices taken under the wing of a management portal, automagically cleansed of security worries and remotely wiped if things come to that. New mobility consulting services will help with this kind of thing and also advise on and assist with mobile website development.

Regional voice customers also have a new toy: a flat regional roaming rate for voice, which should mean less bill shock for travelling execs. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.