{"id":921,"date":"2010-05-18T00:00:00","date_gmt":"2010-05-18T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/18\/ca-unveils-new-cloud-products-and-community\/"},"modified":"2021-12-30T11:38:23","modified_gmt":"2021-12-30T11:38:23","slug":"ca-unveils-new-cloud-products-and-community","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/18\/ca-unveils-new-cloud-products-and-community\/","title":{"rendered":"CA unveils new cloud products and community"},"content":{"rendered":"<p>CA Technologies, which has changed its name from CA Inc., has launched a series of cloud computing products and services at CA World this week in Las Vegas.    <a href=\"http:\/\/www.cloudcommons.com\" title=\"Cloud Commons \">Cloud Commons <\/a>&#8212; a collaborative community and website for IT professionals, which will help them figure out how to best use cloud computing &#8212; has been unveiled by CA Technologies.  Among the website&#8217;s many features is an initiative, led by two Carnegie Mellon University researchers, for an industry-wide, globally accepted measure for calculating the benefits and risks of cloud-computing services.  The researchers are seeking industry involvement via a consortium being formed with researchers from other educational institutions, end user organizations and technology providers, who have expertise in measuring and managing IT-enabled services.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Other foundational members of the Cloud Commons initiative include: Carnegie Mellon University, TM Forum, Red Hat and Insight Investments, which is hosting the site.<\/p>\n<p>&#8220;Demand for cloud services holds significant potential for the technology and communications industries, but many barriers still exist to widespread adoption at an enterprise level,&#8221; said Martin Creaner, president, TM Forum.<\/p>\n<p>This marketplace is expected to include vendor service ratings to enable participants to compare service options.<\/p>\n<p>&#8220;Today, there is no comprehensive, unbiased source that solicits and aggregates the most current and relevant knowledge about cloud computing and the accumulated, actual experiences that organizations are having with the cloud,&#8221; said David Hodgson, senior vice president of the Cloud Products &#038; Solutions business line at CA Technologies.<\/p>\n<p>New products: <\/p>\n<p>* CA Cloud Insight, which gives customers a way of assessing their cloud for what applications are in use, as well as any rogue applications that are in use.<\/p>\n<p>* CA Cloud Optimize, which will help customers make use of the SMI and information from the Cloud Commons Web site.<\/p>\n<p>* CA Cloud Orchestrate, which will provide workflow control based on information from Cloud Insight, Cloud Compose, Cloud Optimize and Cloud Commons.<\/p>\n<p>Both CA Cloud Insight and CA Cloud Compose will go on sale at the end of the year; CA Cloud Optimize and CA Cloud Orchestrate will go on sale next year.<\/p>\n<p>http:\/\/it.tmcnet.com\/topics\/it\/articles\/85530-new-cloud-commons-community-helps-it-pros-learn.htm<br \/>\nhttp:\/\/news.google.com\/news\/url?sa=t&#038;ct2=us%2F0_0_s_0_3_aa&#038;ct3=MAA4AEgAUANqAnVz&#038;usg=AFQjCNEuRD_GU4miOEtyqGCNhvIc3H7QMg&#038;cid=8797540854095&#038;ei=8RrzS_jSAc6clQfAt6_nAQ&#038;rt=SEARCH&#038;vm=STANDARD&#038;url=http%3A%2F%2Fgcn.com%2Farticles%2F2010%2F05%2F18%2Fca-unveils-new-name-and-cloud-products.aspx<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-921","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=921"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/921\/revisions"}],"predecessor-version":[{"id":3408,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/921\/revisions\/3408"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}