Your Personal Cloud Space

Your Personal Cloud Space

My personal cloud…  

The concept of the personal cloud is intriguing to me right now. Why? For the most part, it has a lot to do with what people consider to be a personal cloud. Where private clouds are dedicated solutions built around a single customer or agency using them, the personal cloud is a solution built for a single user. If you search the internet for the concept “personal cloud” you will find an interesting mix and match of answers.

What is the first thing you will see once the search engine returns your results? Storage = personal cloud. Much as vendor’s tried to associate their name with private clouds a couple of years ago storage vendors are trying to align Personal Clouds with personal cloud storage. There is a personal cloud organization however that is arguing a much broader implementation of what Personal clouds should/could/may be. I find myself liking the concept they create. 

On the homepage of the organization, they have an interesting table that denotes the delta between a personal cloud and a personal computer. The area that I find most relevant is the concept of the Personal Cloud and connected Peripherals.

In the past year, the concept of personal weather stations has grown so that now you can publish the weather at your domicile and consume that information anywhere you are. Thermostats allow you to log into them remotely and using your personal cellular device manage the temperature in your home. There are sensors that allow you to measure remotely the amount of hydration in your house plants and well if your washer is leaking water on the floor when you aren’t there.

Your personal cloud is expanding.

I wrote here on CloudTweaks about the potential reality of overtaxing the overall available bandwidth on the internet. Lately as I dabble with Personal Cloud I am even more concerned about the “personal bandwidth” I have available. The number of devices that need my Wi-Fi password has increased in the past 12 months exponentially. From the home security system, home weather station, Smart Pens, tablet’s, televisions and SmartGlasses the network at home is getting a little saturated.

Beyond a simple network connection or complex depending upon your home network there is the concept of applications in your personal cloud. Mobile devices support applications that are not installed locally today, rather they are enabled in the cloud. Most cloud hosted applications run on a mobile device as well as on your laptop and desktop.

You can also have your own VM environment in your personal cloud by simply installing one of the many applications that support virtual machines on your home computer. You don’t get all the automation with the workstation products, but you can run iterations of the management solutions in a VM as well.

Today your personal cloud represents the devices that you want to connect to where you are. It’s the broad concept of your information at your fingertips. The areas of concern in the short run will be around bandwidth in your home. The last area of concern will be the security of your personal data. The reality is that your personal cloud exists today. It is going to continue to expand and fill your device with the information you need to succeed.

By Scott Andersen

Scott works as a software architect and has been involved in IT projects over the past 17 years. 

(Image Source: shutterstock)

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…