Old Hosting Providers Moving To Become Cloud Providers With The Help Of OpenStack

Old Hosting Providers Moving to Become Cloud Providers with the Help of Openstack

Before cloud computing went mainstream, the internet was dominated by large web hosting providers. Anyone that wanted to make a website needed to sign up with a hosting provider for either a free basic account with limited capabilities or a subscribed one with customizable features. This was back when the internet was young, which is to say just a few years ago, but already a very long time in terms of technological development. In this regard, we can liken technology years to dog years, which count faster than actual years. But the domination of traditional hosting providers is drawing to a close, not that they are closing down or anything, they are just shedding their old infrastructure in favor of cloud infrastructure.

They can do this by using Openstack, a software designed to handle everything within an infrastructure as a service (IaaS) provision, to control their resources for proper distribution. The open source initiative was launched by NASA and Rackspace Hosting back in July 2010 which now has multiple supporters and dedicated developers. Gone will be the days that websites go down due to extreme traffic because the server is not able to adapt to the nature of the web traffic, unable to produce more computing power when required. Openstack is a collaborative project between many industry giants like AMD, Intel, IBM, VMware, and HP to name but a few. The project itself is composed of many interrelated technologies and projects that control large concentrations of processing power, storage or other network resources within a data center which can all be managed through a web interface usable by both users and administrators. There are different levels of controls and functionality depending on the account type.

All deployment of Openstack will be made interoperable so that different hosting providers can be linked and a customer from one provider may use the cloud infrastructure of another provider when needed. The primary users of Openstack will probably be those large telecommunication companies who have their own datacenters already and may want to offer hosted services and cloud services using their brand names. This actually helps to spread cloud computing across the globe as a lot of businesses have contracts with these large TelCos and may trust them in terms of service. So if, cloud services are offered, their customers may be willing to subscribe or at least try it out.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…