Welcome!

@CloudExpo Authors: Liz McMillan, Kevin Benedict, Elizabeth White, Jnan Dash, Srinivasan Sundara Rajan

Related Topics: Apache, Agile Computing, @CloudExpo

Apache: Article

The Three Salient Features of Cloud Computing

:Accessibility, Availability, and Scalability - Cloud computing provides tangible benefits, available to users on request

The Duo Consulting Blog

When you boil it down to brass tacks, cloud computing is just a new take on an old idea. Businesses are drawn to the facilities that cloud computing has to offer because the availability of our resources dictates our current needs...and our needs always expand beyond the capacity of our resources.

The first computers took up the space of a three-car garage. It’s amazing to think that all the computing power of those vacuum tube behemoths can now fit on a silicon chip the size of your fingernail, with processing room besides. However, even with all these advances in technology, we find it’s still not enough.

As a multimedia guy, I recognize two governing laws of data:

  • The availability of our resources dictates our current needs.
  • Our needs always expand beyond the capacity of our resources.

It is because of these two laws that more businesses are drawn to the facilities that cloud computing has to offer. Before they reach this decision, they usually first follow a process similar to this:

  • Build a bigger system.
  • Compress the bigger system into a smaller space.
  • Connect systems together to share resources.

My Dad is Bigger than Your Dad

Our first inclination is to put more stuff into the existing box. Where previously we would add more vacuum tubes to give our computers the ability to calculate floating point numbers, nowadays we install faster processors (or multiprocessors), larger hard drives, and more powerful graphics cards with higher video display RAM. The more technically inclined may even tweak the hardware to improve the speed of the data path between each of these components as well.

These bigger systems initially appear to provide all the computing power we need. We are able to run virtually any application, and store all of our data, on a single machine. Before long before we begin to realize new problems:

  • These devices are finite. Disk space is a concrete measurement, and fairly soon we are horrified to learn we can’t store the digital photos of little Mischa’s tenth birthday party because our hard drives are already maxed out.
  • These devices are insecure. Because all the applications and data reside on the same machine, that information is not safe in the event that computer is stolen, or worse, destroyed during a disaster.

Mainframe Computing

What if we were to instead invest in a mainframe computer—a really large computer that can hold our vast quantities of information? Then all our data would be in a centralized location safely protected from the elements. Also, theft of mainframe computers is really not an issue: I doubt very much that even a useful part of one would fit inside a hockey bag.

In a mainframe environment, to use any of our applications, all we’d need to do is connect a dumb terminal to this mainframe. Without any processing ability of its own, the terminal provides all the power of the mainframe at our disposal. Connect several hundred dumb terminals to the same mainframe and we can run an organization called IBM.

Reality Bites

While the processing power of mainframe computers is high, the upfront cost to install a mainframe environment is also high, and prohibitive to the average user. But what if we take our powerful desktop computers and connected them all together? For small- to medium-size enterprises, network computing is a lower-cost alternative to investing in a mainframe.

Most local area networks are set up as one or a combination of two ways:

  • Peer-to-Peer: Applications and data are stored on individual computers. Users run applications on their own computers and can allow other users to work with their files from across the wire.
  • Network Server: Applications and data are stored on a central computer or group of computers. Users can run applications installed on their local computer or on the network server. While users are encouraged to store their data on the central server, there is usually nothing to prevent a user from storing files locally as well.

In a networked environment, the security of the data is still at risk, because unlike mainframe components, a network server, usually the size of a standard desktop computer, can fit into a hockey bag. Also, even though a network setup can cost less than a mainframe, to properly configure it and continue to secure it requires a full-time IT specialist, which adds additional overhead. And once again, space is finite. An organization could easily outgrow even the highest capacity hard drive on their network server.

Head in the Cloud Computing

Through cloud computing, you can have all the power of several mainframe computers, the interconnectivity of a network system, the security of all your data being backed up on a regular basis, and the expertise of several IT specialists, all with a cost equivalent to buying lunch for your staff once a week. With faster Internet connection speeds becoming the norm, many users are already experiencing the benefits of cloud computing and not even realizing it.

Cloud computing is described on Wikipedia as, “…a style of computing where IT-related capabilities are provided ‘as a service’, allowing users to access technology-enabled services ‘in the cloud’ without knowledge of, expertise with, or control over the technology infrastructure that supports them.”

If a computer network provides the combination of computing power, storage capacity, user availability, and security that we want, cloud computing is a really large network, with all those features on steroids. Applications and data can be stored on any computer on this network, and while these computers may vary in size, several of them have the processing capability of mainframe computer systems.

We haven’t quite returned to the days of dumb terminals, however. Instead, we use the features of a standard web browser to access Rich Internet Applications (RIA) that simulate the smooth look and feel of a desktop application.

Soft Serve, Not the Ice Cream Kind

Cloud computing provides tangible benefits, available to users on request. Providing these features “as a service” means that the resources can be shared between several users without any noticeable decrease in performance.

Software as a Service (SaaS) reduces the need to install and upgrade software on users’ desktops. The user always opens the most up-to-date copy of the software, because it is maintained at all times. Google Apps and Zoho are examples of companies providing common application software. Both systems even provide an offline mode for times when users aren’t connected to the Internet. Their files are uploaded as soon as their computers are reconnected.

Hardware as a Service (HaaS) provides users with additional computing power, whenever they require it. For instance, if a retailer has a short-term need to process a high volume of point-of-sale (POS) transactions on Boxing Day, applications can be set up to share the processing across additional computers as necessary.

Platform as a Service (PaaS) is another growing enterprise. These shared hosting systems provide a development environment for developers to build their own applications using prebuilt modules or custom code.

Accessibility, availability, scalability: The salient features of cloud computing. But when you boil it down to brass tacks, cloud computing is just a new take on an old idea. I didn’t even get to discuss virtualization, which is what gives all these “as a service” features their power. Because of virtualization, while the two governing laws of data still apply, it will take a LONG time for our needs to “expand beyond the capacity of our resources.”

Read, Watch, and Learn

More Stories By Tony Chung

Tony Chung is a creative communications consultant who draws from his broad range of experiences and abilities to find parallel strategies for solving problems quickly and efficiently. He combines words, music, multimedia, web programming, technological passion, and analytical wisdom to build solutions timed to suit your business needs and requirements.

Submit a request for information on his consulting services now.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT de...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
"We have several customers now running private clouds. They're not as large as they should be but it's getting there. The adoption challenge has been pretty simple. Look at the world today of virtualization vs cloud," stated Nara Rajagopalan, CEO of Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...