Cloud Computing: Hardware As Software

There’s a lot of confusion surrounding this elegant approach to marshaling remote computer resources. And, we do not wish to profit from the confusion created by the broad marketing of cloud computing to the public. So here we offer a definition of cloud computing that is easy to understand, accurate, and without marketing hype.

1. Cloud Computing Is Hardware As Software

Let’s deal with the first part of our simplified definition of cloud computing – that “cloud computing is hardware as software.” Imagine that hardware resources, like memory and processing power, are replicable and portable like software. This special quality of software allows for its replication almost without effort or expense: the creation of 100 copies of a file is done as easily as two. However, this is not the case with RAM modules or CPUs; they need to be purchased and installed, interrupting the operation of the server. With cloud computing, hardware seemingly assumes the flexibility of software; for example, memory and processing power can be multiplied and moved from server to server at anytime.

The seeming transformation of hardware into a portable and replicable resource is realized by rendering a likeness of actual server hardware – virtual hardware. The guest operating system* is presented with access to hardware surrogates, including virtual memory, virtual processing, and virtual disk. The real hardware remains concealed and isolated from the guest operating system. For example, 64GB of actual RAM might be presented as two individual banks of 20GB, with 24GB withheld and reserved for future use. By controlling the presentation of the actual hardware through the use of virtualization, cloud platforms can dynamically allocate resources to guest operating systems.

A cloud platform, like Open Hosting’s, allows you — and your applications, via our API — to request and modify hardware resources as if they were software. Want more memory? Disk? Such resources can be adjusted without having to wait for a technician to power-down the server, open the server, install new RAM modules, and power-on.

2. Cloud Computing Is Remote Computing

The second part our definition states that “cloud computing is remote computing”. The critical point is cloud computing is more than the virtualization of hardware, but the subsequent packaging of these resources as a remotely accessible service. The service can be private and closed to the public. For instance, many large organizations operate private clouds for just their purposes. Or, more commonly, it is a public retail service, like Open Hosting. The point is virtualization isn’t enough: remote accessibility is key.

“Cloud Computing!”

Behind the marketing of this phrase, there’s an assumption that the definition is commonly understood. Yet, maybe this isn’t the case. As evidence, we regularly receive inquires from folks wanting to migrate their existing applications to a cloud host, often for no obvious technical advantage. They just want cloud.

This has happened before.** In the late 1990s, Sun Microsystems ran TV advertisements for Java, their new computer programming language. By 2000 everyone wanted Java. Most folks didn’t know what it was, but they believed it to be a connection to a shimmering future.

Ten years on, and it is cloud computing. Not since Sun’s launch of Java has the general public been so excited by a technical innovation that they often don’t understand. Everyone wants cloud.

Unlike Java, which was then the property of Sun Microsystems, cloud computing belongs to no one. It is simply a way of organizing computer resources. Still, the expression “cloud computing” — sometimes just “cloud”— is today’s Java largely by the efforts of firms like Microsoft, Apple, and Amazon. Apple has the iCloud. Microsoft’s ‘To the Cloud’ campaign promotes Windows Live. And, Amazon wants your media for its Cloud Player and Cloud Drive.

Used correctly, cloud computing is a truly awesome way to control the computational resources supporting your application.

Guest Post By Open Hosting

The Open Hosting team is a mix of hosting industry veterans and software developers. Open Hosting is a trusted and reliable provider of cloud hosting solutions based in Vienna, VA. Since 2003

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…