Connecting to LinkedIn...

W1siziisijiwmtuvmdqvmtuvmdgvntqvmzgvnzi1l01ptlrbu0hfqkxpr19vtljftkrfukvex0lnqudfx3jlc2l6zwrfyw5kx3jlbmrlcmvklmpwzyjdlfsiccisinrodw1iiiwimtkymhgxmjuwiyjdxq

Blog

Huawei unveils cloud-centric IT product line at HCC 2014

16/09/2014 by

W1siziisijiwmtqvmtavmjgvmtuvmtqvmjcvmzu5l2zpbguixsxbinailcj0ahvtyiisijywmhg0mdbcdtawm2uixv0

At the Huawei Cloud Congress (HCC) 2014, on 16 and 17 September, Huawei is launching data centers, converged storage, cloud operating systems (OS) and Big Data analytics platforms, all under the ‘Make IT Simple, Make Business Agile’ Concept. HCC brings together over 10,000 customers, partners and industry professionals from more than 80 countries and regions around the world to share insights and promote dialogue on industry trends and topics around cloud computing and Big Data. Participants at the 2-day event will hear from 66 of Huawei’s partners and industry leaders across the ecosystem, including Intel, Seagate and SAP.

Huawei’s future-oriented Service Driven-Distributed Cloud Data Center (SD-DC) covers innovations in cloud, Big Data and data management. This new generation data center helps enterprises build service-driven IT infrastructure that features key capabilities such as service awareness, business intelligence and unified management. In addition, SD-DC is open and interoperable with products from third-party vendors.

Huawei is also launching the FusionSphere 5.0 open cloud platform and the OceanStor converged storage system, both of which are key components of the SD-DC architecture. Huawei FusionSphere 5.0 cloud OS is based on OpenStack architecture and delivers software-defined data center capabilities and boosts management automation capabilities. It also supports the application of cloud-based carrier services and NFV.

Designed for enterprise and carrier customers, Huawei’s FusionSphere cloud OS helps customers deploy server virtualization, private cloud, public cloud, and hybrid cloud services on demand. Since its launch, Huawei reports it has built more than 120 cloud data centers based on the FusionSphere cloud OS in 42 countries and regions for customers across industries – including public sector, telecom, energy, finance, transportation, healthcare, education, media, and manufacturing.

This article has been extracted from http://www.telecompaper.com/, please click on this link to read the article in full http://www.telecompaper.com/news/huawei-unveils-cloud-centric-it-product-line-at-hcc-2014--1037243

Montash is a multi-award winning, global technology recruitment firm. Specialising in permanent and contract positions across mid-senior appointments which cover a wide range of industry sectors and IT functions, including:

ERP, BI & Data, Information Security, IT Architecture & Strategy, Energy Technologies, Demand IT and Business Engagement, Digital and E-commerce, Infrastructure and Service Delivery, Project and Programme Delivery.

With offices based in London, Montash has completed assignments in over 30 countries and has appointed technical professionals from board level to senior and mid-management in permanent and contract roles.

comments powered by Disqus

Social Stream

Latest News

W1siziisijiwmtcvmdkvmjkvmdgvmtmvmjkvmjgyl1vudgl0bgvkigrlc2lnbiaomjuplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Are PSLs a Blocker or an Enabler?

2017-10-02 11:00:00 +0100

The use of a Preferred Supplier List (PSL) was intended to support and strengthen relationships and performance between organisations and their third party suppliers. As the technical landscape continues to evolve at rapid rate recruitment and demand for new skills becomes more intense. Are PSLs still the solution or an obstacle to sourcing the right talent? The traditional PSL A dedicated list of partners intended to guarantee quality and availability ...

W1siziisijiwmtcvmdkvmjevmdgvndmvmduvmtmxl1vudgl0bgvkigrlc2lnbiaomjmplmpwzyjdlfsiccisinrodw1iiiwimzgwedewmcmixv0

Why do we punish the victims of hacking?

2017-09-21 09:00:00 +0100

Hacks occur every 39 seconds, with 95% of them targeting governments, retailers and the tech industry. If the hackers are caught, they'll face prison time under the Computer Misuse Act. More often than not, the businesses who are victims of those attacks expose themselves to punishment of their own. The laws that determine the duty of protection owed to businesses and their customers is both vague and broad, making them question just how much protection...