Cloud Computing: Hardware As Software

There’s a lot of confusion surrounding this elegant approach to marshaling remote computer resources. And, we do not wish to profit from the confusion created by the broad marketing of cloud computing to the public. So here we offer a definition of cloud computing that is easy to understand, accurate, and without marketing hype.

1. Cloud Computing Is Hardware As Software

Let’s deal with the first part of our simplified definition of cloud computing – that “cloud computing is hardware as software.” Imagine that hardware resources, like memory and processing power, are replicable and portable like software. This special quality of software allows for its replication almost without effort or expense: the creation of 100 copies of a file is done as easily as two. However, this is not the case with RAM modules or CPUs; they need to be purchased and installed, interrupting the operation of the server. With cloud computing, hardware seemingly assumes the flexibility of software; for example, memory and processing power can be multiplied and moved from server to server at anytime.

The seeming transformation of hardware into a portable and replicable resource is realized by rendering a likeness of actual server hardware – virtual hardware. The guest operating system* is presented with access to hardware surrogates, including virtual memory, virtual processing, and virtual disk. The real hardware remains concealed and isolated from the guest operating system. For example, 64GB of actual RAM might be presented as two individual banks of 20GB, with 24GB withheld and reserved for future use. By controlling the presentation of the actual hardware through the use of virtualization, cloud platforms can dynamically allocate resources to guest operating systems.

A cloud platform, like Open Hosting’s, allows you — and your applications, via our API — to request and modify hardware resources as if they were software. Want more memory? Disk? Such resources can be adjusted without having to wait for a technician to power-down the server, open the server, install new RAM modules, and power-on.

2. Cloud Computing Is Remote Computing

The second part our definition states that “cloud computing is remote computing”. The critical point is cloud computing is more than the virtualization of hardware, but the subsequent packaging of these resources as a remotely accessible service. The service can be private and closed to the public. For instance, many large organizations operate private clouds for just their purposes. Or, more commonly, it is a public retail service, like Open Hosting. The point is virtualization isn’t enough: remote accessibility is key.

“Cloud Computing!”

Behind the marketing of this phrase, there’s an assumption that the definition is commonly understood. Yet, maybe this isn’t the case. As evidence, we regularly receive inquires from folks wanting to migrate their existing applications to a cloud host, often for no obvious technical advantage. They just want cloud.

This has happened before.** In the late 1990s, Sun Microsystems ran TV advertisements for Java, their new computer programming language. By 2000 everyone wanted Java. Most folks didn’t know what it was, but they believed it to be a connection to a shimmering future.

Ten years on, and it is cloud computing. Not since Sun’s launch of Java has the general public been so excited by a technical innovation that they often don’t understand. Everyone wants cloud.

Unlike Java, which was then the property of Sun Microsystems, cloud computing belongs to no one. It is simply a way of organizing computer resources. Still, the expression “cloud computing” — sometimes just “cloud”— is today’s Java largely by the efforts of firms like Microsoft, Apple, and Amazon. Apple has the iCloud. Microsoft’s ‘To the Cloud’ campaign promotes Windows Live. And, Amazon wants your media for its Cloud Player and Cloud Drive.

Used correctly, cloud computing is a truly awesome way to control the computational resources supporting your application.

Guest Post By Open Hosting

The Open Hosting team is a mix of hosting industry veterans and software developers. Open Hosting is a trusted and reliable provider of cloud hosting solutions based in Vienna, VA. Since 2003

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

Cloud Infographic – Guide To Small Business Cloud Computing

Cloud Infographic – Guide To Small Business Cloud Computing

Small Business Cloud Computing Trepidation is inherently attached to anything that involves change and especially if it involves new technologies. SMBs are incredibly vulnerable to this fear and rightfully so. The wrong security breach can incapacitate a small startup for good whereas larger enterprises can reboot their operations due to the financial stability of shareholders. Gordon Tan contributed an…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…