A History of Cloud Computing

A History of Cloud Computing

History of Cloud Computing

History, especially if it deals with victories and defeats, is inherently flawed. No one knew this better than Winston Churchill, who was assured of his place in the historical tomes by his victory in WWII. As he put it, “History will be kind to me for I intend to write it”. Therefore, are we taking a leap of faith by trying to encapsulate the history of cloud computing technology in mere words? Is it a wasted effort?

Not really. In our opinion, the best time to trace the growth of any paradigm, whether technology or culture or any other human endeavor, is when it has grown out of infancy but not attained maturity. For it is then that prejudices will not be able to color our opinions, whether positive or negative.

Since cloud computing is gaining acceptability by the day, it is no longer a beginner in the IT infrastructure space. Again, since there are many who resist the technology citing several concerns like security and availability, it hasn’t matured either. In other words, there’s no time like the present in presenting its history.

The general idea behind the technology dates back to the 1960s, when John McCarthy wrote that “computation may someday be organized as a public utility.” Then, grid computing, a concept that originated in the early 1990s as an idea for making computer power as easy to access as an electric power grid also contributed to cloud computing. For a detailed look at the differences between utility, grid and cloud computing, look at “Cloud Computing vs Utility Computing vs Grid Computing: Sorting The Differences.”

The term “cloud computing” was most probably derived from the diagrams of clouds used to represent the Internet in textbooks. The concept was derived from telecommunications companies who made a radical shift from point-to-point data circuits to Virtual Private Network (VPN) services in the 1990s. By optimizing resource utilization through load balancing, they could get their work done more efficiently and inexpensively. The first time the term was used in its current context was in a 1997 lecture by Ramnath Chellappa where he defined it as a new “computing paradigm where the boundaries of computing will be determined by economic rationale rather than technical limits alone.”

One of the first movers in cloud computing was Salesforce.com, which in 1999 introduced the concept of delivering enterprise applications via a simple website. Amazon was next on the bandwagon, launching Amazon Web Service in 2002. Then came Google Docs in 2006 which really brought cloud computing to the forefront of public consciousness. 2006 also saw the introduction of Amazon’s Elastic Compute cloud (EC2) as a commercial web service that allowed small companies and individuals to rent computers on which to run their own computer applications.

This was soon followed by an industry-wide collaboration in 2007 between Google, IBM and a number of universities across the United States. Next came Eucalyptus in 2008, the first open source AWS API compatible platform for deploying private clouds, followed by OpenNebula, the first open source software for deploying private and hybrid clouds.

2009 saw Microsoft’s entry into cloud computing with the launch of Windows Azure in November. Now, suddenly, there were major players jumping on to cloud computing from left, right and center.

While 2010 saw the maximum number of companies entering this space, 2011 is expected to be even more eventful.

For a look at the possible future of cloud computing, read Where Is Cloud Computing Going? Up, Up And Away!

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

What’s On The Horizon For Cloud Computing

What’s On The Horizon For Cloud Computing

Cloud Computing Trends Now that we are a little more than halfway through 2016, many experts are beginning to make their predictions about cloud computing for the rest of the year and beyond. While many of the trends aren’t too unexpected (the ever increasing acceptance of cloud solutions by businesses, for instance) other trends are…

Tesla Solar Plan Would Cost Billions To Implement

Tesla Solar Plan Would Cost Billions To Implement

A 1,500-word manifesto that Elon Musk unveiled last week, outlining his plan to expand Tesla Motors Inc.’s electric-vehicle line and to build “stunning solar roofs,” may end up costing the company tens of billions of dollars to carry out. Musk, Tesla’s chairman and chief executive officer, gave the estimate on Tuesday after a tour of the…

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security To Grow To $47 Billion In 2021

Healthcare IoT Security It’s obvious that IoT can make the entire healthcare industry more efficient. The kind of data involved can be used to save time, physical energy and operating costs. Because of this, devices that facilitate medical data are becoming more commonplace in the industry. This includes things such as wearables that can track…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud And The Military – In The US

Cloud And The Military – In The US

Cloud And The Military Scandalous cost overruns; the newest high tech doesn’t work any better than very old tech; sweetheart monopoly deals with favorite defense contractors; sole sourcing key components from our enemies – the litany just goes on and on. The military’s relationship with technology always seems to be like watching a slow motion…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…