Heroes Of The Cloud – Part 6 (Google and VMware)

Heroes Of The Cloud – Part 6 (Google and VMware)

Heroes Of The Cloud – Part 6 (Google and VMware)

If there is one company that defines the growth and importance of the Internet, the company would have to be Google. Google did not invent everything that it does on the ‘net, and to be sure, some of the things that the company is attempting to do are in arenas where Google is playing catch-up. There is no denying that in Google’s core business, search, they are still the “go-to” application for most users. Google’s power and influence make them a contender in almost any field they choose to operate in. Really, not bad for a company that a pair of Stanford students started in a friend’s garage in 1997.cloud-google-urz-hozle

Google and the Cloud

One of Google’s first ten employees was Urz Hozle, a former associate professor of computer science at UC Santa Barbara. Hozle’s current title is Google’s Senior VP for technical Infrastructure. Hozle was an early Enthusiast of Cloud computing, but realized that the current data center architecture was insufficient for the needs of Cloud users. Using concepts outlined in his very influential paper “The Data Center as a Computer: An Introduction to the Design of Warehouse-Scale Machines” (co-authored by Luiz Barroso) Hozle supervised the building of Google’s own data centers. These data centers are noteworthy in that they use half the energy of conventional enterprise data centers.

VMware

The heart of Cloud Computing is using resources and equipment located in the virtual world of the Internet to do work for the customer so that he avoids the trouble and expense of actually owning the resources or equipment himself.

The current IT scenario for most businesses is running behind because of these expenses. As IT goes, so does the core business in the modern market place, and it is a rare firm that can afford to keep up using its own hardware.

VMware officially launched in Feb, 1999 and delivered its first product, the VMware Workstation, in May of the same year. The company entered the server market in 2001.

The VMware Workstation is a “hypervisor”, or virtual machine management system, which allows users to set up and use one or more virtual machines using their own x64 computers. In essence, the hypervisor allows several operating systems to run on a single computer, including OS which are not designed for the native computer architecture.

VMware cofounder Edouard Bugnion, the company’s chief architect left the company in 2004 to found Nuova Systems, which was funded and eventually acquired by Cisco. In 2008 VMware announced that they would be collaborating with Cisco to provide joint data center solutions.

By Peter Knight

Sorry, comments are closed for this post.

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…