Friday, December 11, 2009

Cloud Computing

In general, cloud computing customers do not own the physical infrastructure, instead avoiding capital expenditure by renting usage from a third-party provider. They consume resources as a service and pay only for resources that they use. Many cloud-computing offerings employ the utility computing model, which is analogous to how traditional utility services (such as electricity) are consumed, whereas others bill on a subscription basis. Sharing "perishable and intangible" computing power among multiple tenants can improve utilization rates, as servers are not unnecessarily left idle (which can reduce costs significantly while increasing the speed of application development). A side-effect of this approach is that overall computer usage rises dramatically, as customers do not have to engineer for peak load limits. In addition, "increased high-speed bandwidth" makes it possible to receive the same response times from centralized infrastructure at other sites.

The majority of cloud computing infrastructure, as of 2009, consists of reliable services delivered through data centers and built on servers with different levels ofvirtualization technologies. The services are accessible anywhere that provides access to networking infrastructure. Clouds often appear as single points of access for all consumers' computing needs. Commercial offerings are generally expected to meet quality of service (QoS) requirements of customers and typically offer SLAs. Open standards are critical to the growth of cloud computing, and open source software has provided the foundation for many cloud computing implementations.

What happens when the cloud gets hacked? Google claims that could computing is the next "big thing" that they will attempt to use to drive their stock price up. On paper the concept seems simple and efficient but I just hope that security is the main priority. If a hacker gets access to the cloud they have free reign to anything and everything that is stored in the cloud. There is a lot a stake and like I said earlier I hope that the proper measures are taken to ensure that the integrity of its users information.

-source http://en.wikipedia.org/wiki/Cloud_computing

1 comment:

  1. Personally, I feel that the users of cloud computing will have to decide what information could be hacked and not pose a security threat.Companies have to huge amounts of data, and probably the vast majority would not pose a real threat to security of hacked. I would recommend that companies use a dual approach to saving information, using traditional on site servers for sensitive information, and clouds for less sensitive information. This, of course, will not eliminate the threat of a human error, in which information could be stored on the cloud that should have been stored on the local server

    ReplyDelete