The Great Cloud Race: HP Battles Amazon (and IBM) For Tech Supremacy

The Great Cloud Race: HP Battles Amazon (and IBM) For Tech Supremacy

The cloud’s ongoing growth has in-the-know tech experts watching its progress with proud, loving eyes. Yet as with any burgeoning development, it’s taken time for cloud computing to be fully embraced by the establishment — to wit, major companies such as Google and Amazon. Many a new company has introduced itself to the tech world via some application or program that flaunts cloud’s best side. Recent developments have now revealed bigwig tech corporations now getting in on the cloud as a way to make a mark on futurity. Ready or not, cloud computing has become the new paradigm for success in technology.

Making major headway in this Great Cloud Race is Hewlett-Packard. The company recently announced via the New York Times its intent to introduce a potent cloud computing service meant to rival, and eventually perhaps supplant, Amazon’s well regarded Cloud Service. HP’s service will be offered via the public cloud, with a concentration on “third party services” and “small data centers” peppered around the world. Yet the cloud fight between HP and Amazon has actually become a three-man race.

IBM has placed its bid to claim the vanguard of progressive cloud computing, with its new “secure enterprise desktop” device. Through this technology, in the shape of a USB key, a user can essentially transport the entirety of her personal computer, including its software, wherever she may go. IBM’s desktop cloud tool needs no setup software, to boot. The device transforms whatever computer it uses into a host, and any changes a user makes to her desktop will actually be implemented via the cloud.

So IBM and HP have now joined the fray, alongside Amazon, Apple, and Google, in the pursuit of the cloud computing crown. Let us not forget, though, that the cloud favors the new and the bold. Numecent, a new and bold startup, has developed “cloud paging” technology that’s rumored to be arousing raves from tech insiders lucky enough to have witnessed it.

But you don’t need to be a cloud connoisseur to capitalize on this knowledge and appreciate this race to the top in cloud’s big leagues. Indeed, it’s the everyday consumer who stands to benefit the most from all this competition. Not only will she eventually enjoy a panoramic range of cloud technologies, but such programming will also be more useful, more creative, and more cost-effective.

In the hunt to be named cloud’s crown prince, it’s the paupers who’ll enjoy the spoils in due time.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…