Cloud Computing And Virtualization

Cloud Computing And Virtualization

People often ask what is the real difference of cloud computing and “the internet” or “ isn’t the internet already cloud computing”. I often tell them that cloud computing does not equal the internet or vice-versa, the internet is simply the best delivery platform that cloud computing can make use of. You can have a cloud computing infrastructure totally isolated from the internet and it is called a private cloud network. Still, some private cloud networks are made to be accessible via the internet, but the argument still stands that cloud computing does not automatically mean or require the internet.

What makes cloud computing itself is not the hardware technology or the infrastructure, what makes it cloud computing is the way that services and functions are being handled and delivered. In essence what cloud computing means is that everything is being done by a server that is located somewhere that you and I should really not concern ourselves anymore, it’s somewhere out there, “in the clouds”. Behind all the services and applications that are labeled as “cloud” are servers, lots and lots of servers where all the processing elements are, the CPU, RAM, GPU, and even the storage devices. However, a server is only really able to dedicate itself to one task, application, or function and serve that over a local network or typically via the internet. This is very limiting for cloud computing as you would need a lot of servers for multiple applications, taking up space, producing heat, and soaking up electricity like sponges. The answer to this is the whole point of the article, server virtualization.

The problem is that a server can only serve one purpose so you would need more of them. So as I mentioned, the answer is server virtualization, the creation of multiple “virtual” servers via software and using only one or few real server hardware to do it. A powerful server can create hundreds of virtual servers with each having its own hardware specification like CPU speed, RAM size, and storage capacity. And each one of these virtual servers can be put to a single use, providing they do not all require vast amounts of computing power. This means that we are able to host multiple applications and services on a single or small group of physical servers, a very efficient use of hardware resource.

Virtualization is very important for cloud computing and as a result brings another benefit that cloud computing is famous for, scalability. Because each virtual server is allocated only enough computing power and storage capacity that the client needs, more virtual servers can be created. But if the needs grow, more power and capacity can be allocated to that server, or lowered if needed. And because clients only pay for how much computing power and capacity they are using, this can be very affordable for most clients.

Without virtualization, cloud computing as we know it would not exist or would be in a different form. But such is now only in the realm of speculation as virtualization is really here to make Information Technology more affordable for the world.

By Abdul Salam

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…