Cloud Computing: Hardware As Software

There’s a lot of confusion surrounding this elegant approach to marshaling remote computer resources. And, we do not wish to profit from the confusion created by the broad marketing of cloud computing to the public. So here we offer a definition of cloud computing that is easy to understand, accurate, and without marketing hype.

1. Cloud Computing Is Hardware As Software

Let’s deal with the first part of our simplified definition of cloud computing – that “cloud computing is hardware as software.” Imagine that hardware resources, like memory and processing power, are replicable and portable like software. This special quality of software allows for its replication almost without effort or expense: the creation of 100 copies of a file is done as easily as two. However, this is not the case with RAM modules or CPUs; they need to be purchased and installed, interrupting the operation of the server. With cloud computing, hardware seemingly assumes the flexibility of software; for example, memory and processing power can be multiplied and moved from server to server at anytime.

The seeming transformation of hardware into a portable and replicable resource is realized by rendering a likeness of actual server hardware – virtual hardware. The guest operating system* is presented with access to hardware surrogates, including virtual memory, virtual processing, and virtual disk. The real hardware remains concealed and isolated from the guest operating system. For example, 64GB of actual RAM might be presented as two individual banks of 20GB, with 24GB withheld and reserved for future use. By controlling the presentation of the actual hardware through the use of virtualization, cloud platforms can dynamically allocate resources to guest operating systems.

A cloud platform, like Open Hosting’s, allows you — and your applications, via our API — to request and modify hardware resources as if they were software. Want more memory? Disk? Such resources can be adjusted without having to wait for a technician to power-down the server, open the server, install new RAM modules, and power-on.

2. Cloud Computing Is Remote Computing

The second part our definition states that “cloud computing is remote computing”. The critical point is cloud computing is more than the virtualization of hardware, but the subsequent packaging of these resources as a remotely accessible service. The service can be private and closed to the public. For instance, many large organizations operate private clouds for just their purposes. Or, more commonly, it is a public retail service, like Open Hosting. The point is virtualization isn’t enough: remote accessibility is key.

“Cloud Computing!”

Behind the marketing of this phrase, there’s an assumption that the definition is commonly understood. Yet, maybe this isn’t the case. As evidence, we regularly receive inquires from folks wanting to migrate their existing applications to a cloud host, often for no obvious technical advantage. They just want cloud.

This has happened before.** In the late 1990s, Sun Microsystems ran TV advertisements for Java, their new computer programming language. By 2000 everyone wanted Java. Most folks didn’t know what it was, but they believed it to be a connection to a shimmering future.

Ten years on, and it is cloud computing. Not since Sun’s launch of Java has the general public been so excited by a technical innovation that they often don’t understand. Everyone wants cloud.

Unlike Java, which was then the property of Sun Microsystems, cloud computing belongs to no one. It is simply a way of organizing computer resources. Still, the expression “cloud computing” — sometimes just “cloud”— is today’s Java largely by the efforts of firms like Microsoft, Apple, and Amazon. Apple has the iCloud. Microsoft’s ‘To the Cloud’ campaign promotes Windows Live. And, Amazon wants your media for its Cloud Player and Cloud Drive.

Used correctly, cloud computing is a truly awesome way to control the computational resources supporting your application.

Guest Post By Open Hosting

The Open Hosting team is a mix of hosting industry veterans and software developers. Open Hosting is a trusted and reliable provider of cloud hosting solutions based in Vienna, VA. Since 2003

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery Introduced By Savision At Microsoft Ignite 2016

Automated Application Discovery ATLANTA, GEORGIA – September 26, 2016 – Savision, a market leader in service-oriented monitoring solutions that unify IT operations with IT service management, today announced the release of its automated application discovery module for Unity iQ. Savision’s automated application discovery module offers an agentless, trigger-based discovery method that captures infrastructure elements, application dependencies, as well…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Computing – The Game Changer

Cloud Computing – The Game Changer

Global Cloud Index In October, Cisco released its Global Cloud Index (GCI) report for 2014-2019, projecting a near 3-fold growth of global data center traffic, with predictions that this traffic will reach 8.6 zettabytes (cloud data center traffic) and 10.4 zettabytes (total data center traffic) per year in 2019 and 80% of it will come…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…