Apple Vs. Google: The Great Cloud War

Apple Vs. Google: The Great Cloud War

Apple Vs. Google

You wouldn’t have expected it a few years ago, as Apple and Google were focusing on different sectors of the tech industry. In some cases, they actually created technologies that could benefit from each other. However, the two giants are just about ready to go toe-to-toe with each other nowadays.

This has been prompted by Google’s Android OS being the only decent challenger to Apple’s iOS dominance. Additionally, Google and Apple have competing cloud computing platforms, which may serve the same purpose but are vastly different in their philosophical approach. Let’s take a closer look at the two cloud services.

The Google Cloud

The main takeaway from Google’s cloud computing strategy is that they are banking on a future in which broadband internet access is both low cost and available to every single person who needs to use their cloud service and apps. This is because Google’s apps are all connection dependent and can only be used if you are connected to the Internet. Additionally, you need to have fairly decent broadband speeds in order to take full advantage of their best features, such as simultaneous editing of files in Google Docs, where you can see coworkers’ changes happening in real time.

Google’s approach to virtualization is certainly idyllic, and would be a boon to every single cloud user. Unfortunately, it’s not yet fully feasible in today’s world, as there are a lot of places where high-speed internet access is neither available nor financially profitable.  In order for Google’s vision to come true, there are changes needed in outside factors. This includes competition in the big markets and stronger public–private partnerships in the smaller ones.

Now that Google has started making critical apps available offline, it seems that they’re aware of the hurdle they must cross. However, the industry is not yet ready for Google’s vision of cloud computing, and it will not be ready in as little as a couple of years, so Google shouldn’t treat offline access as a mere afterthought.

The Apple Cloud

Apple’s cloud computing, on the other hand, is different from the Google cloud computing service in the sense that it’s not a huge remote pool of resources that will run all of your apps for you. It merely functions as control center that makes sure that data is streamed to devices on schedule and to the right destination. Basically, Apple’s cloud computing merely orchestrates data streams instead of serving as a proxy controller and producer. Apple’s cloud computing is a central repository for files instead of a virtual remote computer.

Which One is Better?

The main difference between the cloud computing approaches of Google and Apple boils down to this. Google’s cloud computing contains all the apps that you need, and your PC only works as a controller for their cloud computing resources. Apple’s cloud, on the other hand, only works as a remote storage of sorts, in which the data is still saved on your device’s storage and the apps will use your device’s main resources and sync files and data back and forth between local storage and the Apple cloud computing.

Apple’s approach may be more practical today, due to the limitations of internet infrastructure. However, in 5 to 10 years, when (or if) super broadband speeds finally become a reality for the majority of the world, Google’s approach may be more practical as it sheds the hassles of syncing.

At the end of the day, deciding which one is the better cloud computing provider boils down to which approach you think is better: Google’s special preference for the Web, or Apple’s special preference for your devices.

By  Kamil Nakhasi

Kamil is an accomplished UK technology writer now living overseas. Kamil currently makes his living writing and editing professionally online. 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…