Where The Cloud Will Grow in 2012: Look Back at 2011

Where The Cloud Will Grow in 2012: Look Back at 2011

2012 is still newborn. But the year holds much promise for cloud computing’s ascendancy in the public’s regard and in the business world’s harnessing of its assets. Looking back at 2011 sheds light on three areas where progress might be made this year: open source platforms, the cloud as a force in popular electronics, and government interest in cloud computing.

The first landmark event of last year arguably took place in May, when IaaS platform Project Olympus was mounted by mobile business cloud company Citrix. Designed to serve as Citrix’s stab at distributing an open source platform, Project Olympus was made available for IT consumers eager to furnish their own spaces in the cloud, either public or private. Olympus functions by harnessing the code from flagship operating system OpenStack, which had been in development since summer 2010 — a collaboration between NASA and Rackspace. Project Olympus, however, stands out as the very first commercialized distribution of OpenStack’s ample resource aimed squarely at large enterprises.

The summer of 2011 was set ablaze by the unveiling of Apple’s iCloud in June. The late Steve Jobs revolutionized consumer electronics by marrying artful craftsmanship with technological brilliance; the iCloud promised to do the same for cloud computing, improving its palatability with a still somewhat distrustful public. iCloud essentially coordinates a user’s experience in every Apple product or software, from the iPad to the iPod, creating a unified harmony between each device the user owns. Delivering his keynote address at the Apple Worldwide Developer’s Conference, Steve Jobs further piqued the crowd’s interest with a strong proclamation: “the iCloud will demote the PC and Mac to being a device.”

The government began to wade into the cloud noticeably as well last year. Its biggest stride yet occurred last August, when Amazon WebServices announced its release of GovCloud, a private cloud service for governmental agencies. The move surprised many, as few believed that the government would put up with the less-than-watertight security potential that the cloud had been known for. Amazon allayed Capitol Hill’s fears with an upgrade in how rigorously GovCloud would maintain informational security. The cloud service was designed to adhere to meticulous regulatory mandates, such as the International Traffic in Arms Regulations and PCI DSS Level One. GovCloud’s progress with Washington’s agencies was seen as a case study for other daring cloud endeavors in the public sector.

How exactly will the cloud shape 2012, from consumer products to Capitol Hlll? Look to CloudTweaks all year long to keep you in the know, first and best.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…