Why “Cloud” Development Will Change The World

Why “Cloud” Development Will Change The World

Why “Cloud” Development Will Change The World

cloud-growth

Back 18-24 months ago,  the three primary application stores for mobile devices passed the One Million total available application milestone. Today, we have moved well beyond that total and there is no stopping the growth.

What however is happening is that applications are built and thrown out for consumption without some of the standards that would benefit the users of the applications. The four pillars of cloud application development.

  1. Scalability
  2. Elastic
  3. Storage Agnostic
  4. Device Agnostic

Pillar one is scalable applications. Now when you think about scalable from a traditional cloud computing perspective you look for the ability to add processing power to your solution as you need it. Scaling up or down depending upon the traffic your application or applications drive. For the mobile device scalability takes on a new meaning. What can the device do? Applications built to take advantage of the small footprint of a smart phone are not simply recreations of existing applications. They extend the exceptional functionality of the smart device (portability) while accepting and developing around its limitations (bandwidth, screen size, video processing power).

Pillar two is elasticity which takes on another meaning for cloud applications. The first part of traditional elasticity is on the fly rapid growth of processing power. For cloud applications that are delivered to a variety of platforms, this elasticity becomes more of a shared processing answer to a problem (where do we get the processing power needed for a solution). Where scalability looks for the limitations of the device being used in this solution elasticity knows the device you are using and offloads the processing for the solution to the right location. There are two distinct flavors of cloud application elasticity.

  • Device knowledge and on-loading/offloading of required processing
  • Device knowledge and focused solution delivery

The first is quite simple; the application is aware of the platform you have accessed it from and is elastic in the sense that it knows where the primary processing can take place. Almost a performance rating of the connectivity and device you are using prior to delivering information to you.

Device knowledge and focused solution delivery takes that a step forward. When your interacting with another user and wish to send them information, the solution is aware of the device the recipient is using. The elasticity here is in responding to the “sender” of information noting the type of device the “recipient” is using. In the case of smart phones, allowing the sender to select a portion of the document for the recipient to review. In the case of a smart phone recipient, the solution can then only forward the required information rather than the entire document.

Pillar three is the concept of being storage agnostic. This is not a hardware discussion where we don’t care who made the disk, the rpm of the disk or even the physical frame the disk is in. Rather it is allowing for the application of the concepts of cloud storage to be applied. Applications that don’t require constant data but are able to allow for offline use are critical. These “storage agnostic” applications now begin the pattern of use case application. If I have an application that has critical information and I have noted that I am traveling in an area with poor cellular service, prompt me to download the information before I enter the bad cellular area. Or prompt me that I don’t have the space or bandwidth to download the information and be prepared to not have that information available.

Pillar four is the concept of being truly device agnostic. Many years ago, Java (write once use many times) was introduced as the unified platform regardless of hardware. It failed to work more often than it did, but the concept of write once use many is the basis of Pillar four.

  • Devices have different capabilities be aware of the users device
  • Device Operating Systems have different capabilities be aware not only of the OS, but also the version of the OS being leveraged. The first concept is known by everyone. Depending upon your personal device preference you are intimate with the strong point and weak point of the various devices that are available. Within applications, the developer needs to be aware of what happens on each device as they go forward. Additionally users may have a number of different devices. Rule one of Pillar four is to be aware of the user’s devices, and which device is connected right now.

Within the various devices now also be aware of the Operating System and the version of the operating system on the device. Being aware of the limitations and capabilities of each OS type within a device family and beyond that aware of which specific device that user is using to connect to the solution rounds out this requirement.

By Scott Andersen

Scott works as a software architect and has been involved in IT projects over the past 17 years. Before that, Scott was a public school teacher in Bloomington Indiana.

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…