This article can also be found in the Premium Editorial Download "Private Cloud: Consumerization and the cloud; cloud management."
Download it now to read this article plus other related content.
Much has been made of how cloud computing can reduce data center costs and bring greater automation to corporate IT. But vendors—and sometimes even users—focus less on the steps required to achieve this vaunted state.
In this issue of our e-zine on strategies for building a private cloud, we delve into the nuts and bolts of making the cloud work in your environment and some of the technical and human challenges that come with such dramatic change.
First, in our Cloud One on One interview, we explore cloud management tools . Expert Bob Plankers says not every tool is right for every task, and this immature field still has some growing up to do to make more of the tools useful and intuitive for users. Then in “Ten Steps to Building a Private Cloud,” we outline some of the key technology and human-related tasks you need to accomplish before you can establish a private cloud infrastructure.
Then, in “Identity as a Service: Can It Rein in Rogue Users?” we explore how Identity as a Service software could help bridge the gap between IT and rogue users. Those users’ increasing tendency to bring new applications and unauthorized devices into corporate environments is straining security policies. Identity as a Service (IDaaS) platforms can deliver applications to end users through a secure portal while giving IT a way to control employee access to corporate resources.
And finally, in our piece “How to Build an Efficient Private Cloud,” Tom Nolle discusses how important hardware and software compatibility are to efficient, successful cloud infrastructures.
Until next time
This was first published in June 2012