Feeds

From virtualisation to private cloud

Small steps to big results

  • alert
  • submit to reddit

Combat fraud and increase customer satisfaction

There is an assumption, which has been repeated over and over, that private cloud naturally follows on from virtualisation activities. As such it has almost become accepted as inevitable, particularly amongst the IT vendors, that the way to improve IT effectiveness, agility and efficiency is to implement a private cloud. To top it off, the discussion is often airbrushed to make it seem like it’s a no-brainer and that it is all smooth sailing.

We know from long experience that many organisations are struggling to keep up with the pace of change and maintain reliability while also trying to keep costs under control. But while the vision of private cloud as a solution is compelling when viewed from afar, just how relevant is it to mainstream IT in general and in particular to solving their shorter term challenges? In order to investigate this we polled a section of readers from The Register to find out their views around virtualisation, private cloud and the challenges they face and not surprisingly it's not quite as simple as vendors might like you to believe.

Some companies have managed to take to private cloud like a duck to water. But for many it can seem to be a daunting challenge to tackle all at once, if at all. Most companies instead improve things by implementing a number of smaller, more targeted optimisations that collectively come together to deliver a big improvement. By doing so, the IT organisation can up the quality of service delivery and enhance business value with a ‘cloud-like’ infrastructure.

If you’re interested in finding out more, click here

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.