What Is A Hybrid Cloud?

What Is A Hybrid Cloud?

What Is A Hybrid Cloud?

With the emergence of cloud-computing technology comes the addition of new terminology. The terms public cloud and private cloud are reasonably well understood. However, a hybrid cloud can mean different things to different people.

Under The Engine

Perhaps the best way to define or explain a hybrid cloud is to deconstruct the phrase into its two components — “hybrid” and “cloud.” A hybrid is, in simple terms, a combination of one or more components or ingredients. Hybrid crops combine the properties of one or more crop species to produce a crop that has disease resistance or higher yields or some other attributes. Better yet, think of hybrid cars. A hybrid car has two sources of power: a traditional gasoline engine, as well as an electric motor and rechargeable batteries. A hybrid car is a very useful example to explain the features of a hybrid cloud, and I’ll return to it later.

YO-mobil-tormoza-XYZ1

(Image Source – Hybrid Car – Gas2.org)

So then how to best define the cloud. The cloud is a computing environment that looks, feels, and behaves like the Internet. That’s because a cloud-computing environment utilizes standard Internet communications protocols and user interfaces to permit a variety of devices and client-side operating systems to establish a connection and thereby use the software and data resources available in a particular cloud.

Now let’s talk about deployment configurations. Sounds technical, right? It really isn’t. A cloud environment may be public; in this case, the cloud is “hosted” or installed on servers that are accessed by multiple different organizations. Each organization has its own applications and data residing in that cloud. Amazon, IBM, HP, and other companies offer public cloud environments. It is important to understand that these public cloud environments are “virtual,” meaning that they are not defined or constrained by physical limitations. Computing resources are dynamically allocated and shared across a network of servers, so that the demand for computing resources is balanced, and each individual user connection experience remains constant. The dynamic load balancing is performed by the cloud service provider and requires no action on the part of the end user. Access and data security, as well as software upgrades, are also provided by the cloud service provider, with little or no action necessary on the part of the end user.

The massive IT infrastructure of public cloud providers — in terms of servers, communication networks and bandwidth — enables them to provide cloud access from virtually anywhere in the world on a 24/7 availability basis, making them ideal for companies with global operations, as well as companies which want or need to provide 24/7 customer self-service applications. A public cloud environment may also be ideal for small and medium-size enterprises (SMEs) that need sophisticated software to run and grow their business but cannot afford the necessary investments in IT infrastructure or resources.

Private Moments

In a private cloud, an individual organization or a third-party provides the IT computing resources, in terms of hardware, networks, and the resource needed to maintain them. A private cloud requires IT resources to install and maintain network security, applications, and database software. For these reasons, larger organizations that already have installed robust IT infrastructure or third-party service providers with many clients can afford the investments necessary to build and maintain a private cloud. A private cloud has the option to offer 24/7 availability to their users and customers or not, depending upon the needs of the particular business and its available IT resources.

How is a hybrid cloud different from public or private cloud configurations? A hybrid cloud is a combination of a private and public cloud. In a hybrid cloud, some applications and data are available via a service provider in the public cloud, while other applications and data are available only in a private cloud maintained by the company or a third party. That company or third party must set up and maintain the security, applications, and databases of the private portion of the cloud configuration. In a hybrid cloud, there are most likely interfaces between the applications and data in the private and public cloud components such that it is transparent to the end user whether they are operating in the public or private portion of the cloud configuration.

Cloud Bursting

Let’s return to the example of the hybrid car for a moment. A hybrid car monitors operating conditions and adjusts the power source accordingly. If the car is cruising on electric battery power and senses a demand for more power, or if the batteries are running low, the gasoline engine is engaged until the demand is satisfied or the batteries are sufficiently recharged. To ensure adequate end-user response time and the processing of transactions on a timely basis, a hybrid cloud should ideally have the ability to balance computing workloads dynamically. One way of doing this is “cloud bursting.” In cloud bursting, a private cloud “bursts” into a public cloud when additional computing capacity is needed. The additional capacity is only paid for when used.

Given the additional complexities of security, capacity, and workload balancing, why would an organization choose a hybrid cloud deployment model? The reasons are many and varied. A hybrid cloud provides an organization with existing IT infrastructure a means to extend their computing capabilities without significant new investments. Organizations with hybrid clouds can provide 24/7 customer or employee access without establishing costly off shift operations. A hybrid cloud also offers a model in which sensitive data and applications can be kept and managed separately.

Think of a hybrid cloud as a marriage of a private cloud and a public cloud. A good marriage requires effort to maintain and grow, but that effort delivers benefits that exceed the effort.

Like the hybrid crops, a hybrid cloud provides benefits via utilization of the latest technical capabilities. Like the hybrid car, a hybrid cloud can monitor the computing environment and adjust capacity and performance dynamically. Thus, for many organizations today, a hybrid cloud is indeed a marriage made in heaven — or at least, in the clouds.

For more information on Acumatica please click here.

By Jon Roskill

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

Cloud Infographic – The Future (IoT)

Cloud Infographic – The Future (IoT)

The Future (IoT) By the year 2020, it is being predicted that 40 to 80 billion connected devices will be in use. The Internet of Things or IoT will transform your business and home in many truly unbelievable ways. The types of products and services that we can expect to see in the next decade…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…