The browser version you are using is not recommended for this site.Please consider upgrading to the latest version of your browser by clicking one of the following links.
We are sorry, This PDF is available in download format only
Create Trusted Compute Pools in the CloudWhile organizations are eager to take advantage of the benefits of cloud computing, cloud security is a major concern, especially in highly regulated industries such as government and financial services. Organizations require assurance that sensitive workloads deployed on the cloud will be protected.One way to gain that assurance is through trusted compute pools, which are collections of computing resources on which components and processes have been measured and verified and are therefore known to be secure. IT professionals can create and manage trusted compute pools in the cloud and then ensure that sensitive workloads run only on trusted and verified servers. This paper describes how trusted compute pools are created using Ubuntu Server*, OpenStack*, and Intel® Xeon® processors. It also provides an introduction to the underlying technologies and processes that enable trust in the cloud.Read the full Create Trusted Compute Pools in the Cloud White Paper.
Citrix partners with Intel for cloud interoperability and cloud on-boarding proof of concept.
Why IT should build a private cloud.
What are public, private, and hybrid clouds?
Red Hat partners with Intel to enable business agility with Red Hat CloudForms.
Parallels works with Intel to provide security monitoring and service catalogs to deploy virtual machines.
Oracle discusses their Cloud Builders reference architecture.