Unmasking Cloud Computing

Unmasking Cloud Computing

People in the Information Technology industry know a lot about cloud computing. However, those not part of the industry, primarily the target market, do have a lot of questions regarding the technology. In fact, a lot of them are surely confused about what cloud really is. Cloud computing is not really a new concept. It is just a different approach to making available IT services which tap the ever increasing power of virtualization technologies and servers which can provide huge computing pools and segregate a single server into various virtual machines which be used on demand.

A public cloud is an IT service which can be accessed by anybody provided he is connected through the internet and has a valid credit card. Payment for this infrastructure is very much akin to those pay-as-you-go services. A public cloud is often managed by a portal which is self-serviced, virtualized infrastructures which are multitenant, and very accessible. A private cloud, on the other hand, is very much like a public cloud but is protected by a firewall to restrict access. It is often accessed through a web-based interface with chargeback and self-service features. Its access is often limited to users within the same business or within a partition of the value chain. A public cloud forces an entity to standardize and institute practices which eventually drives efficiency.

People, who are not very knowledgeable about IT terminologies, may interchange cloud computing with software-as-a-service but experts are quick to point out that software-as-a-service is just a subset of cloud computing. A public cloud can be broken down into platform-as-a-service, infrastructure-as-a-service, and software-as-a-service. Platform-as-a-service delivers software-and-computer to clients, which allows developers to create and deploy applications via the web on a hosted infrastructure. Infrastructure-as-a-service, on the other hand, allows users to access a storage capacity and server remotely. Software-as-a-service provides various software applications through the web.

Cloud computing vendors do not offer long-term contracts thus preventing clients to be locked-in to service for a long time. Most suppliers charge on an as-needed, pay-as-you-go basis. Some providers, like infrastructure-as-a-service vendors, charge on a per-hour basis while those providing storage clouds charge on a per-gigabyte usage monthly. Any software application which runs on a computer can be placed in the cloud but there are applications which are not practical to be put in the cloud like system analysis or disk defragmentation tools. Compliance and regulatory concerns also limits entities from placing applications in the cloud, especially those which involve access of sensitive data. Cloud computing is very popularly used by those who need storage and server capacity, application deployment and development, business and personal applications, collaboration, and IT management.

In general, software applications and data can be moved from one cloud to another. However, there are certain applications which are difficult to move from a cloud to another. There are many vendors who offer services to clients if they want to move their applications from one platform to another. However, there’s no standards-based technology yet to seamlessly transfer applications and data from one cloud platform to the other.

By Florence de Borja

Sorry, comments are closed for this post.

Comics
Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…