Cloud-Washing – Do Not Get Fooled

Cloud-Washing – Do Not Get Fooled

Cloud-washing is a term used for the act of labeling or advertising a service as a cloud computing service even when it truly isn’t one. This is nothing new, especially not around the internet. It’s the same as those ordinary companies during the early boom of the internet that attached the word “web” to their marketing campaigns and spontaneously became dot-com players. Now it’s happening again as many web service companies are erasing the word “web” and replacing it with “cloud”. They are making use of the people’s inability to distinguish real cloud computing to what looks like cloud computing, mainly due to the vagueness and complexity of cloud computing’s definition.


Because of cloud computing’s definition it can be argued that any web-based subscription site is a basic example of SaaS. But what really matters is not the method of delivery or the pricing scheme but the value proposition being offered by the service which makes it a true cloud computing service or a cloud-washed one. A pay-per-use model does not mean that a vendor’s supposedly SaaS offering is actual cloud computing. This is because a subscription model does not guarantee elasticity and automated recovery, two very important cloud computing characteristics. Some vendors might advertise that they have a cloud service which may suggest that they offer elasticity and automated recovery even when they don’t. Do not get fooled.

But there are different types of elasticity. A vendor may claim they offer it, but you have to be sure how elastic their service can get. For example, they may be referring to elasticity in their virtualization layer. So for an IaaS vendor, they can provision you VMs with a gigabyte of memory and promise that they can provide you more if you need it. But this is somewhat limited depending on the availability and usage among all of the users after all the hardware resource is finite. This is just limited elasticity. But in order to provide real cloud elasticity, that sense of infinite resource, a vendor must do more. The vendor must be able to provision and “deprovision” instances quickly and automatically, whatever resource you need be it in the form of RAM, CPU, storage, or VMs. These resources are taken from other subscribers who may not be using it at the moment. This cloud elasticity is horizontal and may be straightforward for IaaS vendors, but we cannot say the same for SaaS and PaaS. Cloud elasticity would be somewhat problematic for them. For example if a software instance demands 24/7 constant connection, then it cannot be deprovisioned, making it inherently partition intolerant, and so cloud elasticity cannot be achieved through this method.

It is not that easy to determine whether your provider is offering the full cloud experience or not and in most cases the providers themselves may not realize that what they are offering is not true cloud computing, but something very close. But for some, that is quite enough to satisfy their needs.

By Abdul Salam

About Abdul

Abdul is a senior consultant with Energy Services, and author of numerous blogs, books, white papers, and tutorials on cloud computing and accomplished technical writer with CloudTweaks. He earned his bachelor’s degree in Information Technology, followed by an MBA-IT degree and certifications by Cisco and Juniper Networks.

He has recently co-authored: Deploying and Managing a Cloud Infrastructure: Real-World Skills for the CompTIA Cloud+ Certification (Wiley).

View All Articles

Sorry, comments are closed for this post.

Digital Transformation: Miracle and Wonder

Digital Transformation: Miracle and Wonder

Digital Transformation These are the days of miracle and wonder. I’ve been leading a small, global research team at the Tau Institute for the past few years to examine the dynamics of IT adoption in more than 100 countries throughout the world. We’ve developed several indices that show how well these nations are doing on a relative basis. We ranked the nations…

‘Tis The Season To Be Deploying Sensors

‘Tis The Season To Be Deploying Sensors

Deploying Sensors Overhead the Christmas Drones are buzzing, delivering packages to the good girls and boys. Back at the main location people are analyzing the good and bad data collected over the year about each person. Data analytics that is creating a list, gathering all the data and then checking the data on that list…

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package For Your Business

How To Choose The Right Cloud Security Package The questions you need to ask yourself when deciding on the right cloud security solution for a growing organisation Not sure which cloud security package will be the best fit for your business? Check out our guide to choosing a service that’s going to meet your needs…

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise: When A Little Assistance Goes A Long Way

Securing A Mid-Sized Enterprise There is no longer any subjectivity in this statement: security is at the top of list for all CIOs. Every meeting I’ve attended over the last three months has been dominated by the topic of security and when it’s injected into the conversation, it’s not necessarily by my team, but the…

Are you SURE you are ready for the cloud?

Are you SURE you are ready for the cloud?

Ready For The Cloud? For several years now, people and organizations have been slowly but surely moving their data and applications to the cloud. Whether it is a local private cloud, Hybrid or a fully hosted one, they all have one thing in common: They are no longer tied to physical hardware. That is how…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor