Infrastructure Matters


Wed, September 22, 2010 | 2pm EDT (GMT-4 New York) / 18:00 GMT / 8pm CEST (GMT+2 Paris)

Recorded

Cloud computing is fundamentally about adding abstraction and then using that abstraction to simplify IT management and speed bring new applications and business services online. If you think of virtualization as abstracting computer hardware, you can think of cloud computing as abstracting at the resource level. So with cloud computing you need to start thinking about capacity from a logical or architectural perspective, rather than in a way that's essentially an artifact of how the hardware had to be physically built.

But the underlying layers still matter. Indeed, they matter more than ever because they're expected to Just Work and to provide the high levels of scale, security, and quality of service expected of cloud computing environments.

This webcast will explore:

  • How the operating system and middleware provide applications with a consistent and portable environment even though they no longer live and die on a specific physical server or maybe even a specific datacenter.
  • The quality-of-service and scalability features ensure In that business applications get the performance they need even though they no longer run on dedicated hardware.
  • The importance of security in a world where physical separation of workloads is increasingly the exception rather than the norm.

Speakers:

Gordon Haff
Gordon Haff is senior cloud strategy marketing and evangelism manager at Red Hat. Prior to Red Hat, Gordon wrote hundreds of research notes and was frequently quoted in publications like The New York Times on a wide range of IT topics, as well as advising clients on product and marketing strategies. He also has many years of hands-on experience with both IT software and hardware.

Email*

 

First Name*

 

Last Name*

 

Country*

 

Address*

 

City*

 

State/Province

 

Zip Code*

 

Company*

 

Job Title*

 

Phone*

 

Estimated Annual Revenue*

 

Role*

 

I understand Red Hat often uses authorized business partners to best serve its customers, particularly in the public and education sectors. Red Hat may share my contact information with those partners.*