Feeds

Brit cloud Elastichosts chases boom to Asia

Sydney, Hong Kong, added to global network

Security for virtualized datacentres

British cloud operator Elastichosts has splashed down in Asia, renting space in Sydney and Hong Kong data centres and declaring it is ready to cash in on the boom in cloud and the healthy economies of Asia.

Elastichost offers a range of cloud hosting and compute services, using the KVM hypervisor and its own enhancements to that platform. CEO Richard Davies says expanding into the region makes sense as the company already has local customers, who prefer their servers to be nearby on in-territory for legal reasons.

“Our marketing is international, many of our customers are international, and we feel it is important to have a global data centre footprint to be able to serve them,” Davies added.

Elastichosts is not a colossal outfit and Davies is aware that Amazon Web Services and Rackspace have recently opened Australian presences. He's therefore banking on the chance for cloudy customisation as a lure for customers, “We have complete flexibility of scaling CPU, memory, disk and SSD, rather than fixed instance sizes,” he told The Reg.

The company has taken space in a Vocus datacentre in Sydney and an Equinix facility in Hong Kong. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.