Unmasking Cloud Computing

Unmasking Cloud Computing

People in the Information Technology industry know a lot about cloud computing. However, those not part of the industry, primarily the target market, do have a lot of questions regarding the technology. In fact, a lot of them are surely confused about what cloud really is. Cloud computing is not really a new concept. It is just a different approach to making available IT services which tap the ever increasing power of virtualization technologies and servers which can provide huge computing pools and segregate a single server into various virtual machines which be used on demand.

A public cloud is an IT service which can be accessed by anybody provided he is connected through the internet and has a valid credit card. Payment for this infrastructure is very much akin to those pay-as-you-go services. A public cloud is often managed by a portal which is self-serviced, virtualized infrastructures which are multitenant, and very accessible. A private cloud, on the other hand, is very much like a public cloud but is protected by a firewall to restrict access. It is often accessed through a web-based interface with chargeback and self-service features. Its access is often limited to users within the same business or within a partition of the value chain. A public cloud forces an entity to standardize and institute practices which eventually drives efficiency.

People, who are not very knowledgeable about IT terminologies, may interchange cloud computing with software-as-a-service but experts are quick to point out that software-as-a-service is just a subset of cloud computing. A public cloud can be broken down into platform-as-a-service, infrastructure-as-a-service, and software-as-a-service. Platform-as-a-service delivers software-and-computer to clients, which allows developers to create and deploy applications via the web on a hosted infrastructure. Infrastructure-as-a-service, on the other hand, allows users to access a storage capacity and server remotely. Software-as-a-service provides various software applications through the web.

Cloud computing vendors do not offer long-term contracts thus preventing clients to be locked-in to service for a long time. Most suppliers charge on an as-needed, pay-as-you-go basis. Some providers, like infrastructure-as-a-service vendors, charge on a per-hour basis while those providing storage clouds charge on a per-gigabyte usage monthly. Any software application which runs on a computer can be placed in the cloud but there are applications which are not practical to be put in the cloud like system analysis or disk defragmentation tools. Compliance and regulatory concerns also limits entities from placing applications in the cloud, especially those which involve access of sensitive data. Cloud computing is very popularly used by those who need storage and server capacity, application deployment and development, business and personal applications, collaboration, and IT management.

In general, software applications and data can be moved from one cloud to another. However, there are certain applications which are difficult to move from a cloud to another. There are many vendors who offer services to clients if they want to move their applications from one platform to another. However, there’s no standards-based technology yet to seamlessly transfer applications and data from one cloud platform to the other.

By Florence de Borja

Sorry, comments are closed for this post.

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…