Cloud Computing: Microsoft Windows Azure Part I

Microsoft Windows Azure – Part I

By now, almost everybody is convinced that cloud computing is here to stay; more applications are getting transformed from on-premises based data center to internet accessible data centers. The benefits of the same are far exceeding compared to the risk associated with it. While the cloud offering from Amazon Web Services, which we discussed in detail here on CloudTweaks, are more towards IaaS or Infrastructure as a Service, Microsoft Windows Azure is more towards a PaaS or Platform as a Service offering. Running applications need a platform. Traditionally this platform can consist of a Server Operating System, Web server software, Database and more. Applications running in the cloud also need a similar platform. Microsoft Windows Azure provides a similar platform in cloud. Microsoft Windows Azure runs on Microsoft data centers spread worldwide.

In this brief article we’ll look at:

  • What is Windows Azure?
  • What are the different components and services?
  • Is it standing vis-a- vis with other leading cloud service providers like Amazon, RackSpace, Terremark etc…
  • The future of Azure

As a series of blog posts/articles, this is part I.

Windows Azure is a service from Microsoft. Companies can use this service to run their applications and store their data. The applications can be consumed by the company employees itself or by the customers of the company. The platform provides basic components like Computing, Storage capacity and a Fabric. As we have seen in Amazon Web Services, computing component runs the application (like EC2 in AWS) and storage component stores the data (like S3 in AWS). Fabric or AppFabric provides a common way to manage and monitor applications that use Windows Azure Platform.

Compute:

The compute service of Windows Azure is primarily intended for running different kind of applications. The design is tuned to support applications with a large number of simultaneous users. Windows Azure is designed to support applications that can scale out, running multiple copies of the same code across many servers. As usual or as done in other cloud services, multiple instances / virtual machine are created. Amazon Web Services uses Xen Virtualization technology in its public cloud service. Microsoft uses is Hyper –V hypervisor technology in Windows Azure. Accessing the compute service goes with account creation and through a browser. In Windows Azure there are two different types of instances.  Web Role Instance and Worker Role Instance. The web role instance is with IIS or Internet Information Server and accepts incoming http (or https) requests.  Worker role instances do not have IIS configured and so they are not hosted.

By Glenn Blake

About Glenn Blake

Glenn Blake is a writer for CloudTweaks and has been writing about technology trends for over 25 years.

View Website
View All Articles

Sorry, comments are closed for this post.

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…