Where The Cloud Will Grow in 2012: Look Back at 2011

Where The Cloud Will Grow in 2012: Look Back at 2011

2012 is still newborn. But the year holds much promise for cloud computing’s ascendancy in the public’s regard and in the business world’s harnessing of its assets. Looking back at 2011 sheds light on three areas where progress might be made this year: open source platforms, the cloud as a force in popular electronics, and government interest in cloud computing.

The first landmark event of last year arguably took place in May, when IaaS platform Project Olympus was mounted by mobile business cloud company Citrix. Designed to serve as Citrix’s stab at distributing an open source platform, Project Olympus was made available for IT consumers eager to furnish their own spaces in the cloud, either public or private. Olympus functions by harnessing the code from flagship operating system OpenStack, which had been in development since summer 2010 — a collaboration between NASA and Rackspace. Project Olympus, however, stands out as the very first commercialized distribution of OpenStack’s ample resource aimed squarely at large enterprises.

The summer of 2011 was set ablaze by the unveiling of Apple’s iCloud in June. The late Steve Jobs revolutionized consumer electronics by marrying artful craftsmanship with technological brilliance; the iCloud promised to do the same for cloud computing, improving its palatability with a still somewhat distrustful public. iCloud essentially coordinates a user’s experience in every Apple product or software, from the iPad to the iPod, creating a unified harmony between each device the user owns. Delivering his keynote address at the Apple Worldwide Developer’s Conference, Steve Jobs further piqued the crowd’s interest with a strong proclamation: “the iCloud will demote the PC and Mac to being a device.”

The government began to wade into the cloud noticeably as well last year. Its biggest stride yet occurred last August, when Amazon WebServices announced its release of GovCloud, a private cloud service for governmental agencies. The move surprised many, as few believed that the government would put up with the less-than-watertight security potential that the cloud had been known for. Amazon allayed Capitol Hill’s fears with an upgrade in how rigorously GovCloud would maintain informational security. The cloud service was designed to adhere to meticulous regulatory mandates, such as the International Traffic in Arms Regulations and PCI DSS Level One. GovCloud’s progress with Washington’s agencies was seen as a case study for other daring cloud endeavors in the public sector.

How exactly will the cloud shape 2012, from consumer products to Capitol Hlll? Look to CloudTweaks all year long to keep you in the know, first and best.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

On-Premise VoIP vs The Cloud

On-Premise VoIP vs The Cloud

Modern Day Phone Systems The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if we cut through all the strange wording and focus on the features that make each system unique, we can develop enough of an understanding to make a well-informed decision for…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data – Are Big Data Analytics Your Friend or Enemy?

Understanding Big Data The term “Big Data” is highly reminiscent of terms like “Big Pharma”, and it has a tendency to make consumers and professionals alike a bit nervous. However, whereas Big Pharma refers to large pharmaceuticals companies with market sway and seemingly countless political lobbyists, big data simply refers to the exponentially rapid growth…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

Hoarders And Data Collectors:  On The Brink Of Unmanageability

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising