Feeds

HP, SAP talking HANA-as-a-service

New acronym! IMCaaS (In-memory-computing-as-a-service)

Combat fraud and increase customer satisfaction

HP and SAP are discussing the possibility of introducing an as-a-service edition of the software giant's Hana in-memory computing product.

Anita Paul, senior director of HP's industry transformation consulting practice for Asia Pacific and Japan today told The Reg she will shortly meet SAP to discuss creating the service.

Amazon Web Services recently started offering Hana-as-a-service in its usual elastic mode of operation. SAP can also boast several hardware partners for the platform, with IBM, Cisco, Fujitsu and HP, among others, all capable of cooking up a box with the correct specifications.

HP entering the market with managed Hana-as-a-service will be a fine endorsement of the platform, and also a sign of the tight HP/SAP relationship.

Adding Hana-as-a-service will, Paul said, satisfy HP clients in two ways.

One sign of satisfaction will come from sating customers' desire to run the system, as Paul said many want HP to provide the platform. The second is a desire for XaaS from HP's consulting services, a trend Paul said she embraces wholeheartedly because the nature of XaaS offers better value for customers. That it can also mean better margins for HP, which hosts such systems in its own data centres and may also have the chance to provide hardware through an internal transaction (hardware sells to consulting), is another welcome by-product of such deals.

Paul said this kind of engagement can also be good for sysadmins and architects, as in her experience customers who walk the XaaS path are happy to outsource some operations, but not design. Skilled personnel therefore stay on the payroll even as the boxes they once tended go to a better place, in the nicest way possible.

Sysadmins' lives may be a little complicated when customers decide they prefer on-premises operations, although Paul said the deals HP strikes under those circumstances often make it very clear there is some kit on-site that IT staff are forbidden from touching at risk of violating service level agreements and driving up costs. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.