Cloud-Washing – Do Not Get Fooled

Cloud-Washing – Do Not Get Fooled

Cloud-washing is a term used for the act of labeling or advertising a service as a cloud computing service even when it truly isn’t one. This is nothing new, especially not around the internet. It’s the same as those ordinary companies during the early boom of the internet that attached the word “web” to their marketing campaigns and spontaneously became dot-com players. Now it’s happening again as many web service companies are erasing the word “web” and replacing it with “cloud”. They are making use of the people’s inability to distinguish real cloud computing to what looks like cloud computing, mainly due to the vagueness and complexity of cloud computing’s definition.


Because of cloud computing’s definition it can be argued that any web-based subscription site is a basic example of SaaS. But what really matters is not the method of delivery or the pricing scheme but the value proposition being offered by the service which makes it a true cloud computing service or a cloud-washed one. A pay-per-use model does not mean that a vendor’s supposedly SaaS offering is actual cloud computing. This is because a subscription model does not guarantee elasticity and automated recovery, two very important cloud computing characteristics. Some vendors might advertise that they have a cloud service which may suggest that they offer elasticity and automated recovery even when they don’t. Do not get fooled.

But there are different types of elasticity. A vendor may claim they offer it, but you have to be sure how elastic their service can get. For example, they may be referring to elasticity in their virtualization layer. So for an IaaS vendor, they can provision you VMs with a gigabyte of memory and promise that they can provide you more if you need it. But this is somewhat limited depending on the availability and usage among all of the users after all the hardware resource is finite. This is just limited elasticity. But in order to provide real cloud elasticity, that sense of infinite resource, a vendor must do more. The vendor must be able to provision and “deprovision” instances quickly and automatically, whatever resource you need be it in the form of RAM, CPU, storage, or VMs. These resources are taken from other subscribers who may not be using it at the moment. This cloud elasticity is horizontal and may be straightforward for IaaS vendors, but we cannot say the same for SaaS and PaaS. Cloud elasticity would be somewhat problematic for them. For example if a software instance demands 24/7 constant connection, then it cannot be deprovisioned, making it inherently partition intolerant, and so cloud elasticity cannot be achieved through this method.

It is not that easy to determine whether your provider is offering the full cloud experience or not and in most cases the providers themselves may not realize that what they are offering is not true cloud computing, but something very close. But for some, that is quite enough to satisfy their needs.

By Abdul Salam

Sorry, comments are closed for this post.

Comics
Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…