Cloud Computing: Hardware As Software

There’s a lot of confusion surrounding this elegant approach to marshaling remote computer resources. And, we do not wish to profit from the confusion created by the broad marketing of cloud computing to the public. So here we offer a definition of cloud computing that is easy to understand, accurate, and without marketing hype.

1. Cloud Computing Is Hardware As Software

Let’s deal with the first part of our simplified definition of cloud computing – that “cloud computing is hardware as software.” Imagine that hardware resources, like memory and processing power, are replicable and portable like software. This special quality of software allows for its replication almost without effort or expense: the creation of 100 copies of a file is done as easily as two. However, this is not the case with RAM modules or CPUs; they need to be purchased and installed, interrupting the operation of the server. With cloud computing, hardware seemingly assumes the flexibility of software; for example, memory and processing power can be multiplied and moved from server to server at anytime.

The seeming transformation of hardware into a portable and replicable resource is realized by rendering a likeness of actual server hardware – virtual hardware. The guest operating system* is presented with access to hardware surrogates, including virtual memory, virtual processing, and virtual disk. The real hardware remains concealed and isolated from the guest operating system. For example, 64GB of actual RAM might be presented as two individual banks of 20GB, with 24GB withheld and reserved for future use. By controlling the presentation of the actual hardware through the use of virtualization, cloud platforms can dynamically allocate resources to guest operating systems.

A cloud platform, like Open Hosting’s, allows you — and your applications, via our API — to request and modify hardware resources as if they were software. Want more memory? Disk? Such resources can be adjusted without having to wait for a technician to power-down the server, open the server, install new RAM modules, and power-on.

2. Cloud Computing Is Remote Computing

The second part our definition states that “cloud computing is remote computing”. The critical point is cloud computing is more than the virtualization of hardware, but the subsequent packaging of these resources as a remotely accessible service. The service can be private and closed to the public. For instance, many large organizations operate private clouds for just their purposes. Or, more commonly, it is a public retail service, like Open Hosting. The point is virtualization isn’t enough: remote accessibility is key.

“Cloud Computing!”

Behind the marketing of this phrase, there’s an assumption that the definition is commonly understood. Yet, maybe this isn’t the case. As evidence, we regularly receive inquires from folks wanting to migrate their existing applications to a cloud host, often for no obvious technical advantage. They just want cloud.

This has happened before.** In the late 1990s, Sun Microsystems ran TV advertisements for Java, their new computer programming language. By 2000 everyone wanted Java. Most folks didn’t know what it was, but they believed it to be a connection to a shimmering future.

Ten years on, and it is cloud computing. Not since Sun’s launch of Java has the general public been so excited by a technical innovation that they often don’t understand. Everyone wants cloud.

Unlike Java, which was then the property of Sun Microsystems, cloud computing belongs to no one. It is simply a way of organizing computer resources. Still, the expression “cloud computing” — sometimes just “cloud”— is today’s Java largely by the efforts of firms like Microsoft, Apple, and Amazon. Apple has the iCloud. Microsoft’s ‘To the Cloud’ campaign promotes Windows Live. And, Amazon wants your media for its Cloud Player and Cloud Drive.

Used correctly, cloud computing is a truly awesome way to control the computational resources supporting your application.

Guest Post By Open Hosting

The Open Hosting team is a mix of hosting industry veterans and software developers. Open Hosting is a trusted and reliable provider of cloud hosting solutions based in Vienna, VA. Since 2003

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Native Persistent Storage for Linux Containers

Red Hat Offers Container Storage Latest Red Hat Gluster Storage release enables greater agility and efficiency for OpenShift developers deploying application containers in production SAN FRANCISCO – RED HAT SUMMIT – June 28, 2016 – Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced new storage innovations designed to enable developers to…

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…