By Cloud News Desk | Article Rating: |
|
July 15, 2009 07:45 AM EDT | Reads: |
32,689 |
Anyone familiar with the history of Unisys will not be at all surprised to learn that the company is the latest giant to enter the arena of enterprise cloud computing.
Indeed, with its deep experience and rich technological innovation and capabilities in the enterprise server marketplace, as well as its involvement in transaction-intensive, mission-critical environments, it's a natural evolution for the company. As a pioneer in large-scale computing, Unisys is in a unique position to provide cloud computing that is secure enough and scalable enough for enterprise-class computing.
In an informative and well-written white paper published today at SYS-CON.com, Dr Michael A. Salsburg, a Distinguished Engineer at Unisys who has published and presented over 60 papers internationally in the fields of infrastructure and business service modeling, management and optimization, describes how the company's ability to deliver RTEs and RTIs whether in-sourced or outsourced helps Unisys provide the perfect platform for the emerging cloud computing environment.
Titled "The Perfect Storm for Enterprise-Class Clouds," the white paper focuses on the key attributes required for enterprise computing and explains how the Unisys Secure Cloud can deliver these through enterprise-class cloud computing.
The Three Key Characteristics of Cloud Computing
Salsburg also describes three key characteristics of cloud computing: elasticity (provisioning and deprovisioning resources in real time to meet workload demands), utility (providing resources on a 'pay-as-you-go' basis), and ubiquity (providing services available from the worldwide web).
Protecting Data-in-Motion
Unisys has been recognized as a leader in secure computing, receiving the ISO 27001 2005 certification for best practices in Information Security Management for all of its data centers and managed service centers. The multitenant approach of Cloud Computing brings up a warning flag for IT professionals who understand the security risk of this approach, and Unisys has a unique approach to protecting the integrity of data-in-motion (data that is transmitted through the cloud network).
Don't Just Jump Blindly Into the Cloud
To learn more about what you need to consider before "jumping into the cloud," read Dr Salsburg's white paper today:
Download the Unisys White Paper "The Perfect Storm for Enterprise-Class Clouds"
Published July 15, 2009 Reads 32,689
Copyright © 2009 Ulitzer, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
Related Stories
- Unisys President To Keynote Cloud Computing Expo
- Unisys & Cloud Computing: Breaking Through Barriers to Adoption
- Unisys Named “Platinum Sponsor” of Cloud Computing Expo
- Exclusive Q&A with Rich Marcello - Unisys President, Systems & Technology
- Unisys & Cloud Computing: Anywhere, Anytime IT Needs Also To Be Secure
- Unisys – A Clear Vision for the Cloud
- The Genesis<sup>1</sup> of a Secure Cloud
- The Journey to a Secure Cloud
More Stories By Cloud News Desk
Cloud Computing News Desk brings the latest industry news related to the Cloud paradigm of massively scalable IT resources and capabilities delivered as a service using Internet technologies. For up to date news on the International Cloud Computing Conference & Expo series, the easiest way is to follow it on Twitter.
- Google Maps and ASP.NET
- A Cup of AJAX? Nay, Just Regular Java Please
- Java Developer's Journal Exclusive: 2006 "JDJ Editors' Choice" Awards
- Building a Drag-and-Drop Shopping Cart with AJAX
- The Top 150 Players in Cloud Computing
- Who Are The All-Time Heroes of i-Technology?
- What Is AJAX?
- Rich Internet Applications with Adobe Flex 2 and Java
- Where Are RIA Technologies Headed in 2008?
- Google Maps! AJAX-Style Web Development Using ASP.NET