Opinion and Definition of the Cloud

Opinion of the Cloud

Even though, cloud computing has become exceedingly common, the fact remains that people seem to have differing opinions when it comes to its definition. The issue is not the lack of definition or the lack of an agreed coherent one, but rather the lack of apparent direction. Cloud computing is an extremely large topic, but it is being used in very specific ways. In the same vein that makes it hard for people to stay on the same page when talking about general computing without agreeing to something specific, people need to be specific when they talk about cloud computing. This is because it encompasses infrastructure, architecture, deployment, applications, development, automation, operations, management, optimization and a dozen other topics that are equally beneficial and all would be a valid topic when referring to cloud computing.

Because of this inherent confusion with regards to conversation structuring, Yung Chou, a Technology Evangelist of the Microsoft US Developer and Platform Evangelism Team, devised an easy to remember principle that we can all agree on and use as a proper base when discussing cloud computing. The principle is called the “5-3- 2 Principle” and refers to the five essential characteristics of cloud computing, the three cloud service delivery methods, and the two deployment models which when put together properly describes what cloud computing is.

First up is he “5 Essential Characteristics of Cloud Computing”: On-demand and self-service, ubiquitous network access, location transparent resource pooling, rapid elasticity, and measured service with pay per use. The characteristics were defined by the National Institute of Standards and technology (NIST) as part of their “Definition of Cloud Computing” publication, and they mostly speak for themselves as far as what each means at first glance. This publication is also where the principle is derived from. These five characteristics are all required for something to be qualified as cloud computing, according to NIST.

The 3 stands for the three service delivery methods, namely: Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure (IaaS). All services being offered using cloud computing would fall under one or more of the above delivery methods, whether it be office applications and games (SaaS) or cloud backup storage or computing resources (IaaS). It becomes easier to define whether the service you are using is really of cloud computing or not just by judging if it is being delivered through one of the above methods.

And lastly, we have the two main deployment models of cloud computing: The Private and the Public Cloud models. NIST lists down four deployment models, but the other two is really just either a combination or a derivative of these two main ones. The public cloud is meant for public consumption while a private cloud’s infrastructure is dedicated for private use, like in large corporations or Government agencies.

The 5-3-2 Principle is a new, simple, and structured way to approach cloud computing whether it is for simple conversations between colleagues or for educating people on what cloud computing truly is. The structure for using the principle in discussions is straightforward, validate business needs starting with the 5 characteristics, then go into the feasibility of delivering the intended service or function with the 3 delivery methods, the finally end with which deployment model would be more preferred in the situation.

By Abdul Salam

Kevin Julian

Patients Increasingly are embracing technology, and so must the pharmaceutical industry

Patients Increasingly Embracing Technology COVID-19 has driven home the need to use digital solutions more broadly, which means C-Suites may be turning to their CTOs for advice As lockdown restrictions went into effect due to ...
Couchbase

Episode 13: How Developers will Revolutionize Digital Transformation Efforts Despite Challenges

How Developers will Revolutionize Digital Transformation Efforts In February 2021 Couchbase released the results of a survey that showed how developers play a key role in helping organizations meet their digital transformation goals despite facing ...
Digital Theft

Cross-Site Scripting – Why Is It A Serious Security Threat For Big Data Applications?

Security Threat And Big Data Applications (Updated August 11th, 2020) IBM, Amazon, Google, Yahoo, Microsoft - and the list goes on. All these leading IT enterprises have been affected by Cross-Site Scripting (XSS) attacks in ...
Juan Pablo Perez Etchegoyen

69% of Enterprises are Moving Mission-Critical Information to the Cloud

Why Security matters According to a research study by the Cloud Security Alliance (CSA), 69% of enterprises are moving mission-critical information to the cloud. These migrations are massively complex and take meticulous planning to ensure ...
Kamal Maggon

Mining Business Value – Accelerating a US Company’s Cloud Transformation

Mining Business Value Traditional industries like mining have been slow to adapt to changing IP technology.  Of course, coal and other mining types have adopted new technologies starting with mechanical drills powered by pistons, then ...

PROXY SERVICES

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Smartproxy

    Smartproxy

    Smartproxy is a rising star in the constantly growing proxy market. Smartproxy offers awarded customer service, impressive performance, and is serious about your anonymity (yes, cybersecurity matters). The latest features developed by Smartproxy are 30 minute long sticky sessions and Google Proxies. Rumor has it, the latter guarantee 100% success rate

  • Bright Data

    Bright Data

    Bright Data’s network is one of the most robust of its kind globally. Here are its stark advantages: Extremely stable connection for long sessions (99.99% uptime guaranteed). Free to integrate with our Proxy Manager which allows you to define custom rules for optimized results. Send unlimited concurrent requests increasing speed, cost-effectiveness, and overall efficiency.

  • Rsocks

    Rsocks

    RSocks team offers a huge amount of residential plans which were developed for plenty of tasks and, most importantly, has been proved to be quite efficient. Such variety has been created on purpose to let everyone choose a plan for a reasonable price, online, rotation and other parameters.

  • Storm Proxies

    Storm Proxies

    Storm Proxies' network is optimized for high performance and fast multi-threaded tools. You get unlimited bandwidth. No hidden costs, no limits on bandwidth. Try Storm Proxies 100% Risk Free. If you are not happy with the service email us within 24 hours of purchase and we will refund you.