|By Jeremy Geelan||
|July 15, 2009 07:15 AM EDT||
It is increasingly clear that the economy has forced enterprises to rethink their traditional cost models and minimize their capital expenditures in favor of pay-as-you-go models; accordingly cloud computing, in any of its forms (internal, external, hybrid) is here to stay.
The size of data sets continues to grow exponentially and once data leaves a client's data centers, the ability of a cloud provider to meet the client's security, privacy and compliance requirements becomes a key issue.
This is where Unisys, with its recently announced four-part cloud computing strategy, comes in.
In an interview this week with SYS-CON's Cloud Computing Journal, Rich Marcello - President, Unisys Systems & Technology - described how the company is delivering on the first two parts this year beginning with its Cloud Transformation Services, announced June 30, followed by the Unisys Secure Cloud Solution which will become available on July 31.
Here's how Marcello summarized what Unisys is doing right now:
"A lot of vendors talk security in the cloud but we've tackled this issue head-on and believe we have an advantage. Security is inherent in all Unisys operations and offerings and, like Data Center Transformation and Outsourcing, is one of Unisys four key areas of strength.
We address security by ensuring operational excellence. Unisys Secure Cloud services teams operate ISO 20000-certified delivery processes that are ITIL V3-compliant. All of this protection is delivered in independently audited and ISO 270001-certified delivery centers. We utilize security best practices - a layered multi-vendor approach to security with Intrusion Detection and Prevention Services (IDPS), firewall management, 24x7 security monitoring, advanced correlation and analytics, auditable logs, and so forth.
From a cloud perspective, our commitment is to provide a security framework that is as good as or better than any clients could establish for themselves. We do all of this and more with the addition of our patent-pending Stealth technology that allows private communities of interest based on FIPS 140-2, 256-bit Advanced Encryption Standard (AES) encryption and cloaks the data with proprietary 'bit splitting'."
That "Stealth technology" Marcello referred to allows different groups in a multi-tenant client environment to share the same IT infrastructure without fear of exposing one client's data to another, Marcello pointed out, making it an important differentiator.
Dr Michael A. Salsburg, a Unisys Distinguished Engineer who has published and presented over 60 papers internationally in the fields of infrastructure and business service modeling, management and optimization, recently wrote a whitepaper titled "The Perfect Storm for Enterprise-Class Clouds" which also referred to security based on Stealth, as follows:
"For data-in-motion (data that is transmitted through the cloud network), Stealth not only provides a higher level of encryption than the standard approach (which is called Secure Socket Layer or SSL), but it also breaks apart the information into multiple streams. In this way, if another user of the cloud was monitoring the communication, that user would not only have to decrypt the stream but would also have to find the other streams that are part of the original message.
The term “Stealth” refers to the fact that, once a customer is “Stealthed” within its own community of interest, the actual existence of the communication path cannot be discovered by observers outside that community of interest. For data-at-rest, such as data stored on disk, the same techniques apply. The data is split into multiple stripes, and each stripe is encrypted. For both data-in-motion and data-at-rest, Stealth provides a new level of security and isolation that does not require changes to the application or hardware. Its simplified approach to isolation ensures that other communities of interest cannot detect that the data path exists, thus mitigating many of the requirements for network-based isolation through virtual LANs and other current techniques."
Salsburg's current focus within Unisys is the realization of real-time infrastructure management. Marcello noted, in the interview already quoted, that virtualization and automation are fundamental to cloud computing and for Unisys. "Our Real-Time Infrastructure technology powers our cloud," Marcello told Cloud Computing Journal's Jeremy Geelan.
"Virtualization is an enabler that helps us supply only the needed amount of IT resources based on the workload demand of the business at any given time. Automation adds elasticity to the environment, reduces the time needed for changes, and eliminates or at least simplifies the manual intervention in a potentially rapidly changing environment," he continued.
The whitepaper written by Salsburg ends with a useful vision statement which is worth quoting in full:
"Over the last 60 years Unisys has had the vision to develop and utilize new technologies and services for the benefit of the industry and our customers. Our mainframe systems have been using virtualization and automation technologies for over 20 years. We have taken the deep engineering capabilities in delivering highly available, high transaction systems with complex workloads and applied them to the evolving and consolidating marketplace.
Our ability to deliver RTEs and RTIs whether in-sourced or outsourced helps us provide the perfect platform for the emerging “cloud computing” environment. Our mission is to provide customers with the most open, cost effective and secure IT service environment by helping them understand, plan, implement and manage their IT infrastructure their way. Unisys is uniquely positioned to provide cloud computing that is secure enough and scalable enough for enterprise-class computing."
Marcello said on June 30 when the Unisys portfolio of solutions was announced that Unisys clients, while seeing great value in moving enterprise applications and data to the cloud, felt they had lacked the comprehensive security to make them confident in actually doing so.
Security, Marcello stressed, is in the DNA of Unisys, just as data center transformation and application modernization are its heritage.
Outsourcing services tailored to the client's specific business needs is a Unisys forté, he noted. "Our cloud computing strategy draws on all those core capabilities to help clients break through the barriers to adoption and gain a full range of options for cloud services while safeguarding their operations and lowering IT costs," Marcello said.
When asked by Cloud Computing Journal how an IT manager should decide if cloud computing is right for their business and which workloads to move, Marcello replied that it is really about understanding what makes the most business sense for the client and what they are trying to accomplish, adding:
"As part of the June 30th announcement, we have Unisys Cloud Transformation Services, available now, which allow clients to plan and migrate to the type of cloud environment that best meets their business goals. These services help clients assess what application workloads can be moved to the cloud, how that can be done, and the technology, financial and security implications of their choices."
Salsburg summarized those services in his whitepaper as follows:
"The services start with an assessment where the target data center is evaluated to discover workloads that could benefit from cloud computing. Once they are discovered, the software and storage requirements are evaluated regarding a shift into the cloud. Unisys does not require that applications be re-factored or rewritten.
The assessment services produce deliverables that lay out a low-risk plan to transform from the current state to a future state where the workload can take advantage of the key cloud attributes. Because no changes are required to the workload, there are no unique APIs to lock in the workload. With the Unisys Secure Cloud, you can receive customized services where your unique requirements and computing approach are retained."
Over the next several months, Unisys intends to launch additional solutions that give clients enhanced options in implementing cloud services.
Unisys plans a "cloud-in-a-box" solution as a comprehensive IT infrastructure package, aimed at enabling what it calls "quick and cost-effective implementation of a private cloud." This solution will include virtualization capabilities, automation of ITIL best practices for service management, and Unisys Converged Remote Infrastructure Management capabilities, with Unisys Stealth solution ("as an option for extreme security," the company says).
Unisys also plans to deliver "hybrid" cloud technologies that provide what it believes is the best of managed and dedicated services by combining public and private cloud capabilities.
With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
Feb. 9, 2016 08:00 AM EST Reads: 360
One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
Feb. 9, 2016 07:45 AM EST
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
Feb. 9, 2016 07:15 AM EST Reads: 214
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
Feb. 9, 2016 06:45 AM EST Reads: 166
SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
Feb. 9, 2016 06:15 AM EST Reads: 173
As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
Feb. 9, 2016 05:30 AM EST Reads: 155
Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
Feb. 9, 2016 05:00 AM EST
SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO...
Feb. 9, 2016 04:45 AM EST Reads: 182
SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
Feb. 9, 2016 04:45 AM EST
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
Feb. 9, 2016 04:30 AM EST Reads: 140
SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part...
Feb. 8, 2016 03:00 PM EST Reads: 582
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Feb. 8, 2016 02:00 PM EST Reads: 385
SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
Feb. 8, 2016 12:45 PM EST Reads: 366
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
Feb. 8, 2016 10:45 AM EST Reads: 397
SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
Feb. 6, 2016 03:30 PM EST Reads: 742
Most people haven’t heard the word, “gamification,” even though they probably, and perhaps unwittingly, participate in it every day. Gamification is “the process of adding games or game-like elements to something (as a task) so as to encourage participation.” Further, gamification is about bringing game mechanics – rules, constructs, processes, and methods – into the real world in an effort to engage people. In his session at @ThingsExpo, Robert Endo, owner and engagement manager of Intrepid D...
Feb. 5, 2016 09:00 PM EST Reads: 802
Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
Feb. 2, 2016 02:00 PM EST Reads: 423
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Feb. 2, 2016 04:30 AM EST Reads: 865
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless...
Feb. 1, 2016 05:00 AM EST Reads: 956
The IoT's basic concept of collecting data from as many sources possible to drive better decision making, create process innovation and realize additional revenue has been in use at large enterprises with deep pockets for decades. So what has changed? In his session at @ThingsExpo, Prasanna Sivaramakrishnan, Solutions Architect at Red Hat, discussed the impact commodity hardware, ubiquitous connectivity, and innovations in open source software are having on the connected universe of people, thi...
Jan. 31, 2016 09:00 PM EST Reads: 742