Cloud Computing: Cloud Service Models – Part 3

Cloud Service Models – Part 3

Continued From Part 2…

Infrastructure as a Service (IaaS)

This service model enables user organizations to forgo deployment of new datacenter equipment to handle growing operational needs. Rather, the business obtains needed IT infrastructure – servers, security, storage, networks, etc. – from a cloud services provider, often via a self-service catalog. While a user company can run applications, databases, operating systems and other software on top of its selected infrastructure, it has no direct control over or access to those machines. The cloud service provider manages the infrastructure, including any scaling up or down as needed.

Infrastructure as a Service is similar in concept to a traditional dedicated hosting service, with two major differences: Organizations tap into a shared, highly scalable pool of resources, and they pay for only what’s used on a utility basis. In other words, organizations can increase productivity while eliminating under utilization costs. IT shops must keep in mind, however, that multi-tenancy applies across the public cloud infrastructure. They have no way of controlling the types of virtual resources running atop the infrastructure they’ve provisioned from the cloud.

Platform as a Service (PaaS)

Derived from the SaaS model, PaaS caters to developers’ needs. Rather than simply delivering prepackaged applications via the on a service model, a PaaS provider offers up the entire computing platform and solutions stack needed for an application runtime environment. With PaaS, a company can deploy applications without incurring the associated upfront provisioning and ongoing maintenance and management costs of the underlying infrastructure. The user organization has application control, the caveat in many cases being that the developers must be comfortable with the PaaS provider’s choices for programming languages, interfaces, development tools, database support and the like.

The types of PaaS offerings vary; which option works best for a business depends on its goals. For example, some cloud companies offer a PaaS and SaaS combo, providing organizations with the ability to customize the packaged application. Although being able to tweak the application may make the SaaS model more attractive, the catch is that when combined with a PaaS offering, SaaS becomes less portable. The richest PaaS offerings enable an organization to support the entire application development lifecycle.

Software as a Service (SaaS)

Often geared toward the end user who needs access through a web browser or other thin clients, SaaS provides access to applications hosted on a service provider’s cloud infrastructure. A business can find just about any general office application available via the SaaS model. Customer relationship management (CRM), calendaring, e-mail and human resources management are among some of the more common applications delivered as services from the cloud infrastructure.

For IT departments, IT service management, spam filtering, intrusion prevention and other traditional security software are among the application types increasingly available via the SaaS model. With SaaS, the user organization neither owns the application nor the associated servers, operating systems, storage, network or other IT resources required for its support and delivery. For example, users can define their own firewall policies or white-label applications in their names.

Key Questions When Considering the Cloud

Some questions to ask internally before hopping on to the Cloud bandwagon:

  • Which parts of my business are suitable for moving to a cloud-based delivery model and which are not?

  • How much of each process should I consider placing on the cloud?

  • Should I retain control in-house but use cloud-based infrastructure, buy the entire process as a service, or something in between?

  • Which services are enterprise-ready and offer the right levels of security and governance for my business?

  • How does transitioning to a cloud impact my procurement and what else should I consider before signing on the dotted line?

  • How do I establish a winning strategy to fulfill short-term needs and provide long-term advantage by leveraging virtualization and cloud?
By Gopan Joshi

Gopan is Product Manager: Cloud Computing Services, Netmagic Solutions Pvt. Ltd. and has expertise in managing products and services in various market scenarios and life cycle stages. His experiences ranges from introducing cutting edge innovations in existing products, existing markets to new technology, new markets.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…