Can Natural Disasters Doom The Future Of Cloud Computing?

Can Natural Disasters Doom The Future Of Cloud Computing?

In the wake of Hurricane Sandy, many people are asking whether cloud computing can withstand nature’s wrath. The storm took several major cloud computing companies offline, including Amazon Web Services (at least on the East Coast), and left thousands of websites and online services down for hours—and in some cases days.

Hurricane Sandy has definitely proved that the cloud is vulnerable to natural disasters and extreme weather patterns, but that hardly presages the death of cloud computing. All computers and electronic systems are equally susceptible to the same events. Millions of people lost telephone and electricity service in the wake of Hurricane Sandy (as is the case for essentially all major storms). But cloud skeptics seem to conveniently forget that even if cloud services didn’t go down, victims of natural disasters without power still wouldn’t be able to access them.

In reality, most cloud computing company’s data centers are far more resistant to extreme weather and other disasters than the on-premises servers and work stations belonging to most homes and businesses. At several data centers along the eastern seaboard, data centers lost grid-based power but then immediately switched over to emergency generators. For many cloud companies, it was only when their generators were running out of fuel that they began shutting down servers. Such an organized shutdown is far safer than sudden power disruptions at a typical home or office, which are often responsible for hardware damage and data corruption.

Critics also typically fail to mention that the underlying network infrastructure upon which U.S. data centers rely is one of the most secure public utility systems in the country. While much of the nation’s electricity system is aboveground and millions of miles of waterlines have been cited by civil engineers as being in decay, the fiber-optic data transmission network which data centers use is almost always securely buried belowground—and sometimes even underneath oceans.

If anything, Hurricane Sandy will likely inspire cloud computing companies and data centers to develop even more robust protocols for dealing with extreme weather, power outages, and other emergency events. Already, several companies are experimenting with running data centers with alternative energy sources, such as solar, geothermic, and tidal, that are completely independent of the national power grid. That kind of forward thinking and investment are what set cloud computing companies apart from the many businesses that rely on traditional on-premises IT infrastructure and public utilities.

By Robert Shaw

About Robert

Robert Shaw was an early entrant into the cloud computing sector, working as a consultant for Accenture on server virtualization and software-as-a-service migration. He has also been a technical editor for eHow and other web properties and still provides local IT consulting services.

View All Articles

Sorry, comments are closed for this post.

Comics
Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…