Demand For Standards—Interoperability To Fuel Converged Cloud Growth

Demand For Standards—Interoperability To Fuel Converged Cloud Growth

Interoperability To Fuel Converged Cloud Growth

According to cloud computing experts at IEEE, the biggest barrier to cloud services adoption is not cloud security or privacy fears, but concerns about service interoperability.

According to Dr. Alexander Pasik, CIO at IEEE and a former Gartner analyst:

Security is certainly a very important consideration, but it’s not what will inhibit further adoption. To achieve the economies of scale that will make cloud computing successful, common platforms are needed to ensure users can easily navigate between services and applications, regardless of where they’re coming from.

IT decision makers from corporate CIOs to SMB owners want to know that their cloud services—both software and infrastructure—will be able to communicate with one another, and that they will be able to easily migrate from one service to another. They’re also concerned about service integration, cross-platform support and the ability of new cloud solutions to integrate with their existing on-premises infrastructure.

One answer to these concerns is the relatively new field of converged cloud development. Converged cloud goes beyond the traditional hybrid cloud framework by offering IT departments a unified cloud management platform for administering private, public and managed cloud services. For example, the recently launched HP Converged Cloud will include a virtualization service designer that allows IT managers to create and administer private and public SaaS solutions that utilize both public cloud and on-premises data storage.

Bill Veghte, HP’s software chief, is at the forefront of converged cloud development. To put it in his words, “HP Converged Cloud enables enterprises to incorporate a blend of public, private and managed cloud services with their existing IT to create a seamless hybrid environment that rapidly adapts to their changing requirements.”

With HP’s move to converged cloud, they’re shifting the cloud computing focus away from end-user engineers and startups toward a customer set that includes mainstream IT, service providers, non-tech enterprises and ISVs. And, unlike Amazon Web Services, HP plans to include managed cloud services in its catalogue of offerings.

OpenStack, the massively scalable open-source cloud infrastructure operating system, is the platform that makes converged cloud management possible. OpenStack—and possibly similar open-standard projects—will be at the heart of providing converged infrastructure solutions to both enterprises and cloud service providers. Developed by NASA and Rackspace, OpenStack aims to provide any organization with the ability to offer cloud computing services that can run on any hardware and potentially communicate with any other OpenStack-hosted cloud service.

HP isn’t the only company betting on OpenStack’s success. Companies including IBM, Intel, AMD, Cisco, Dell and Red Hat have all invested significant resources in OpenStack. They’re all betting that open standards and transparent service interoperability will be the necessary drivers behind wide-scale enterprise cloud computing adoption.

In a similar push toward open-source cloud solutions, a number of tech giants are also putting their weight behind KVM as the new banner carrier for open hypervisor technology. HP has made KVM central to their converged cloud strategy, and Novell, SUSE, IBM and Cisco all support KVM for open virtualization.

As converged cloud solutions mature, expect to see even stronger cloud computing adoption among enterprises. Converged cloud could even dethrone the industry’s established giants. To compete, Amazon must develop much more robust cloud management and support services, and companies focusing on proprietary solutions—Microsoft and VMWare, for example—will need to embrace the open-source movement. Only time will tell whether these giants are nimble enough to adapt.

Post Sponsored by HP

By Joseph Walker 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Infographic – The Future Of Big Data

Cloud Infographic – The Future Of Big Data

The Future Of Big Data Big Data is BIG business and will continue to be one of the more predominant areas of focus in the coming years from small startups to large scale corporations. We’ve already covered on CloudTweaks how Big Data can be utilized in a number of interesting ways from preventing world hunger to helping teams win…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…