Skip to main content

CA unveils its Cloud strategy

CA EITM solutions address this need for virtualization management, and deliver the following benefits, among others:

Improved Agility

* Provision and monitor resources in the cloud: CA Data Center Automation Manager helps consumers and providers of cloud services to deliver, scale, and manage dynamic computing resources on demand. The solution enables enterprises, Infrastructure Utility providers, business process outsourcers, and cloud computing providers to seamlessly provision and monitor cloud computing resources to allow for overflow capacity during peak demands, rapid policy-based response to business demands, more dynamic failover, and highly efficient infrastructure.
* Accelerate and automate virtualized data center provisioning: CA Data Center Automation Manager empowers IT organizations to integrate and automate virtual and physical server provisioning cycles. By automatically allocating resources in real time based on business policies, customers can accelerate the provisioning of applications into production and rapidly provision additional capacity in response to dynamic business demands.
* Employ change management for dynamic virtualized environments: CA Service Desk Manager’s change management function helps to govern approval of data center automation policies, guided by CA CMDB’s advanced change impact analysis, visibility to complex infrastructure dependencies and record of approved configurations. As automated policies are executed by CA Data Center Automation Manager, CA CMDB and its automated application discovery function can log and track automated changes, allowing change managers to analyze how automated policies are complying with authorized configurations.
* Dynamically extend workload automation to virtualized environments: The integration of CA Workload Automation and CA Data Center Automation Manager provides the unique ability to help to identify and provision computing capacity to accommodate workloads onto virtualized environments.


Source

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!