Recent problems experienced with Ransomware are evident from infections, which have occurred in 99 countries including China and Russia. The organization that was worst hit by the attack was the National Health Service in England. It was reported that there was a WannaCry programme that demanded...

The Vitality Of Seeding Openness Within The Cloud

The Vitality Of Seeding Openness Within The Cloud

In the context of cloud investment and associated justifications, present day ventures are particular about three core concerns that are by no means novel and have haunted the IT industry since day one – agility, flexibility and customization. The parameters sound exceedingly familiar, especially to those who have had a taste of Linux, an operating system that takes pride in capitalizing on the said concerns and morphing them into benefits. Although contemporary cloud giants are burning midnight oil to deliver on the best of consumer-end innovations, monetary restrictions are clearly holding them back from providing the much-needed open eco-system for cloud technology.

The IT industry today stands at a turning point where openness in terms of software dynamics is in escalated demand, rather than mere acceptance. Cloud computing is evidently undergoing the same characteristic chain of pre open-transformation phases, just like operating systems and virtualized environments had once. Initiatives like OpenStack have exhibited clear-cut commitment to develop open-source private and public clouds by supporting like-minded developers and software architects. The community software project has successfully secured backing of over 180 organizations (and counting).

The very conceptual foundations of open-source software philosophy provide the boost to proceed ahead of the procedural restrictions intrinsic to proprietary technology, rendering software collaborative, reasonably priced and easily accessible.

Cloud computing should deliver fully on its promise of scalability, seamless deployment and ease of use. Achieving the said feat while being stuck with a single solution seems quite unlikely. There’s a fierce battle out in the open; the top guns are ardently preparing custom cloud solutions on top of their indigenous ‘hypervisors’ – a term that has its roots in virtualization and has extended to cloud computing. On real grounds, however, only a handful of ventures deploy a single hypervisor. This translates to dependency on multiple cloud solutions expected to collaborate autonomously. This is not flexibility; anything that doesn’t integrate well doesn’t fit well. The open cloud initiative on the other hand offers better integration and is continuously pumping resources to improve on the same, leading to organization-wide hassle-free operations.

In addition, within an open solution, security concerns are easier to manage – breaches traceable and rectifiable. The same with a proprietary system is near to impossible. The reason is simple. A number of security experts and experienced developers with a broad spectrum of experience, interacting in a highly collaborative open setup, scrutinizing the code for vulnerabilities – this all adds up to an overall reduced probability of security lapse and within-code bug prevalence. Unlike the proprietary approach, it is not up to a single vendor to come up with a solution should a situation arise; the open-source advocates are prompt to response with fixes and updates (unpaid that are).

There is sufficient rationale to promote an open cloud ecosystem. A powerful open community that craves for cloud novelty and technological advancement is all that is needed to steer cloud computing towards an entire new level.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.


(ISC)2 and Cloud Security Alliance Host Cloud Security Summit to Help Cybersecurity Pros Securely Harness Cloud Technologies

By CloudBuzz | September 22, 2017

(ISC)2 and Cloud Security Alliance Host Cloud Security Summit Research cites strengthening of cloud security skills top priority over next three years CLEARWATER, Fla. ,Sept. 22, 2017 /PRNewswire-USNewswire/ — (ISC)² today announced it’s partnering with the Cloud Security Alliance (CSA) for the CSA…

Exclusive: T-Mobile, Sprint close to agreeing deal terms – Sources

By CloudBuzz | September 22, 2017

(Reuters) – T-Mobile US Inc (TMUS.O) is close to agreeing tentative terms on a deal to merge with peer Sprint Corp (S.N), people familiar with the matter said, a major breakthrough in efforts to merge the third and fourth largest…

Hack of U.S. securities regulator rattles investors, stirs doubts

By CloudBuzz | September 21, 2017

WASHINGTON/NEW YORK (Reuters) – Wall Street’s top regulator faced questions on Thursday about its defenses against cyber criminals after admitting hackers breached its electronic database of corporate announcements and may have used it for insider trading. The incursion at the…

Leaking Cloud Databases and Servers Expose Over 1 Billion Records

By CloudBuzz | September 21, 2017

Servers Expose Over 1 Billion Records As The Wall Street Journal recently pointed out, some clients of cloud service providers such as Amazon and Microsoft are accidentally leaving their cloud databases exposed due to misconfigurations of their services. Coupled with recent headline-making…

Thales Joins the Microsoft Enterprise Cloud Alliance

By CloudBuzz | September 21, 2017

SAN JOSE, Calif., Sept. 21, 2017 /PRNewswire/ — Thales, a leader in critical information systems, cybersecurity and data security, is now a member of the Microsoft Enterprise Cloud Alliance (ECA). Designed to foster innovation and promote awareness of partner solutions, the ECA membership…

Addressing the UK NCSC’s Cloud Security Principles

By CloudBuzz | September 20, 2017

As your organization adopts more cloud services, it’s essential to get a clear picture of how sensitive data will be protected. Many authorities, from government regulators, to industry standards bodies and consortia, have provided guidance on how to evaluate cloud…