Having The Best Of Both Worlds With Hybrid Clouds

Having The Best Of Both Worlds With Hybrid Clouds

“It might be said now that I have the best of both worlds. A Harvard education and a Yale degree.”
– John F. Kennedy (1917-1963), 35th President of the United States.

If a child is offered the option of candy or a rollercoaster ride at the amusement park, chances are he or she would love to have both. Even adults would like to have all the beneficial options  instead of choosing only one of them. It’s common human psychology to want more, to yearn for “the best of both worlds.”

Why can’t we have the same in cloud computing? Why do we have to forsake our existing IT infrastructure to go on the cloud? Why do we have to restrict ourselves to traditional IT if we don’t want to accept cloud computing until the technology matures and security concerns are addressed. Why does it have to be “either-or” and not “both”?

Think about the following scenario. You spend thousands of dollars to acquire your dream home theater system over the last year. You sacrifice simple pleasures like that expensive Indian restaurant you used to frequent twice a week, you work overtime for that coveted bonus and miss quality time with your significant other, you put off your annual holiday – all for the sake of that home theater you’ve wanted for so long.

Now, a week since you started using it, you are informed by the news channels that all that technology is obsolete. You cannot sell the equipment you have bought (no buyers) and you cannot upgrade (completely different technology). You wouldn’t be pleased, would you? And that’s putting things mildly.

Now, think of the Chief Information Officer (CIO) who has just spent millions on upgrading the company’s servers, only to be told that the technology is obsolete and that he should shift to cloud computing. Not only will that amount to wasted expenditure, the CIO may well retort, “If it ain’t broken, why fix it?” In light of the massive expenditure recently undertaken and the additional initial investment required for migrating to the cloud, future efficiencies of scale and operations wouldn’t cut much ice with the CIO.

However, all is not lost. With hybrid clouds, it is possible to have “the best of both worlds,” using traditional IT infrastructure in combination with cloud computing for maximum effect. Hybrid cloud can be defined as the “use of physical hardware and virtualized cloud server instances together to provide a single common service.” In other words, the company provides and manages some resources in-house and has others provided externally by cloud computing providers.

Not only does this approach make optimal use of resources, it also helps address most of the security concerns that have held back adoption of cloud computing. Companies can choose to keep their most important data on local servers, while offloading the rest on clouds. They can choose to carry out critical operations like business intelligence in their own data centers, while using cloud computing for more mundane, yet processing-intensive tasks.     This should allay some concerns that I had mentioned in one of my previous articles, How Small Firms Can Benefit Big From Cloud Computing (And Why They Are Not).

Gartner analyst Stanley Zaffos has been quoted as saying that “the hybrid cloud storage appliance actually has intelligence, software and local storage built into it.” According to Zaffos, “by deduping the data and encrypting it, it’s reducing bandwidth charges,” as well as monthly storage charges.

It’s no coincidence that several providers are leveraging hybrid clouds as an entry mechanism to the immense potential of cloud computing. The latest to join the bandwagon, HP, is leveraging its BladeSystem converged infrastructure of servers, storage and network connectivity bundled together with automation software for management and governance . Additional security will be provided to allow connectivity between public clouds and clients’ existing IT infrastructures.

As you can see, with hybrid clouds, it is possible to “eat your cake and have it” as well.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…