Published/updated: July 2012
By Andrew Buss
Virtualisation is seen by many as a key foundation stone for private cloud
When 118 respondents to a recent online survey were asked whether they thought that virtualisation skills provide a firm foundation for moving to private cloud, just over half agreed. Around a quarter were neutral about this, while fewer than 10 per cent disagreed.
But private cloud is not universally seen as the automatic next step from virtualisation
When asked whether they thought that private cloud was the natural next step from virtualisation, just under 40 per cent agreed, though those with greater experience were more inclined to acknowledge the progression.
Implementing a full private cloud can be complex and costly
Few organisations are at the level where their IT department can justify rolling out a full private cloud solution. However, many of the aspects of private cloud can bring recognisable benefits to the way IT is run and provides services to the business. Many companies could benefit from cherry-picking the most relevant parts of private cloud to make their infrastructure more dynamic and ‘cloud-like’.
Getting to grips with management will be the key to cloud-like environments
All too often, applications, systems or platforms are implemented on a project basis and then managed using a bunch of separate tools that come as default with each solution. In addition, IT operations teams are often physically distinct, leading to a fragmented management environment. Being able to get on top of automated workload management and distribution will require structural change to get the teams working together as well as investment in integrated management tool sets.
Charge back and billing are low-down on the private cloud priority list
While many voices in the industry opine that billing and self-service are key elements of private cloud, the evidence suggests that it is low down on the real priority list. If a billing culture is already in place, it may help to accelerate the move to a more private cloud-like environment, but it is clearly not a pre-requisite for moving this way.
This report is free of charge. Click above to download the PDF or view the interactive e-document.
If you experience any problems during this process please contact us at;
email@example.com or call +44 (0)1425 626501 / 620008
By Jack Vile & Dale Vile
As both company and personally owned mobile devices are increasingly used in business, understanding and dealing with the associated risks has become a significant concern for many. In this report we explore some of the trends in mobile technology adoption. ...more
By Dale Vile & Tony Lock
If it has been a while since you thought about your DR measures, or a review has been prompted by a risk assessment, compliance audit, actual disaster or some other scare, it’s worth taking some time to understand what can be achieved in light of important changes that have taken place over the past few years. ...more
By Tony Lock
With the advent of digitisation, all public sector environments generate and capture a significant amount of electronic data. Against this background, this paper explores how to manage costs and risks while meeting these changing needs through ‘active archiving’. ...more
By Dale Vile
In some organisations, the tension between IT and business teams has come to a head around the topic of devices & the so called ‘Bring Your Own Device’ phenomenon.It’s time for IT and business managers to get together & start a proper dialogue about to deal with evolving requirements. ...more
By Dale Vile
By Dale Vile
Organisations of all sizes are trying to understand the security implications of mobile working, device proliferation and BYOD. But with IT vendors offering up a broad range of options, it can be hard to know where to focus your efforts ...more
By Tony Lock
While the importance of business information is almost universally recognised, few organisations have enjoyed either the time or the resources required to ensure that the data they store across an expanding range of computer systems is adequately protected. ...more