Cloud computing present traffic news duiih

 Vanguard and concepts of cloud computing

 The efficiency and low cost of computing in the cloud - programs and services delivered over the internet - is attracting many companies and institutions. In addition, the new "Chrome" (browser and operating system, both from Google), are designed to facilitate access to the applications in the cloud.

Although this is a highly topical issue, many people distant or close to the topic may be prisoners of the confusion and uncertainty about a lot of issues, from the selection and control of suppliers to security and regulatory compliance. We have tried to help compile a list of great resources that will be useful to understand these issues.

Here is a list of terms used in relation to the cloud, so we don't get seal face when someone asks us if we already use PaaS or if our cloud is private, public or hybrid.

IaaS, PaaS, SaaS: the three pillars of services in the cloud. Respond respectively to Infrastructure as a Service, Platform as a Service, and Software as a Service. IaaS refers to the provision of equipment (servers, virtual machines, components, network, etc.), PaaS is related to the provision of a platform (hardware and operating systems), and SaaS refers to applications hosted on remote (e-mail, security, programs, etc.).Cloud computing present


2 XaaS: a generic "X" which may be substituted for any service that businesses demand. For example, we can speak of WaaS (Worplace as a Service), UCaaS (Unified Communications as a Service), IDaaS (Identity as a Service), MaaS (Monitoring as a Service), and they will come up...

3. Private cloud: data is stored in an environment only accessible to administrators, protected by a firewall or other measures that restrict access and control. The administrator controls which applications used and who has access to them.

4. Public cloud: in this case, the cloud is controlled by external managers, and different clients share server, storage and other infrastructure in the network. It has advantages such as payment by use, scalability or maintenance, while not the most advisable option to host sensitive information.

5 Hybrid cloud: a combination of the previous two. Companies can manage their applications or most critical data in a private cloud, and the less crucial in a public.

6 Hadoop: an initiative of Google, and named in tribute a toy elephant. It's a software framework, supported by a community of developers and Java-based, aimed at analyzing large volumes of data for business intelligence applications.

7 Big Data: in Internet information is measured in petabytes and exabytes, complex, and unstructured data that once processed with software like Hadoop or MapReduce offer identifiable patterns of behavior and utility companies or Governments.

8 EC2: service Amazon Elastic Compute Cloud (EC2) provides millions of customer infrastructure and support to host their applications in virtual machines from Amazon, also remember King of e-commerce.

9. Windows Azure: the public platform of cloud from Microsoft, which grows in strategic importance within the company with its integration with Windows Server 2012.

10 Explosion cloud: quiet, clouds are safe and do not explode. "Cloud bursting" identifies a technique aimed at environments with varying work loads. For example, an application can function in a private cloud, and then go to a public if there is high demand, thus saving resources and money.

There are several organizations and industry groups that help to understand the concept of computing in the cloud, they report on best practices and facilitate standards:

Cloud Security Alliance is a non-profit that promotes the implementation of best practices to provide guarantees of security and general training on the best uses of computing cloud. They have a Google Group and a group of LinkedIn where you can ask questions or see what problems faced by other colleagues in the it industry. You can follow them on Twitter, CloudSA. Jericho Forum is an association dedicated to advancing secure business in a global environment of open network. Cloud Computing Interoperability Forum is an incorporated non-profit association to promote the adoption of computing services in cloud. 

Open Cloud Computing Interface Working Group is a working group dedicated to an API specification for remote management of cloud computing infrastructures. Distributed Management Task Force: Open Cloud Standards Incubator is dedicated to the interoperability of management for cloud computing systems.

There is significant and valid business reasons for the change of paradigm to the computing cloud.And apply the fundamentals of outsourcing.
Reduced costs: cloud computing can reduce both the costs of capital (CAPEX) and operating expenditure (Opex) since resources are acquired only when needed and only pay when used.
Refined use of staff: use cloud computing frees valuable staff allowing them to focus on delivering value instead of engage in maintenance of hardware and software.
Robust scalability: cloud computing allows immediate enlargement, either up or down, at any time, and without long term commitment.

A study carried out by CA Technologies (NASDAQ: CA), on service providers cloud in North America (CSPs), reveals that more than half of these companies, customers opt for a private cloud services model, while 32% choose public cloud services. In addition, these CSPs expect their businesses to grow 30% in 2012.


Although the cloud market is still considered as something new, many of these companies has given cloud services since 2009, and 22% reported having offered services cloud-based much before that date. Almost 25% indicates that they have had "very successful" in their activities with cloud services (have met or exceeded their goals), while another 35% said that they have been "moderately successful" in such efforts.


According to their investments in 2012 to increase profits cloud, 55% of respondents indicated that they plan to increase their marketing activities, while 46 per cent is developing new cloud services to expand their existing offerings, 31% will make investments to specialize in vertical markets. These investment areas suggest that the CSPs have recognized the need to differentiate their services in a highly competitive market place, and create more awareness for best results with the client.

Cloud computing present
Also personal replanting this cloud computing greatly influencing the way we use computers: increasingly use more cloud applications: Gmail, Twitter, Facebok, Youtube... Paradoxically these wonderful advantages, such as ease of access, the centralization and flexibility, could also be the cause of new types of insecurity.

For many companies the security of services in the cloud becomes a real obstacle for adoption. In fact, a recent study conducted among more than 300 information technology Directors revealed that 78% believed that security was the main fear in adopting cloud and, in particular, public cloud technologies. The use of the cloud increases, mainly due to its advantages in elasticity, flexibility and scalability. But there is enough security in the cloud?

At this point, it is important to remember that many security decisions involve making any concession. Be safe in the cloud means renouncing a form of control on the other. The traditional security controls based on the location: If you know where something is and you can claim your property, then probably be sure. If you don't know where it is and it seems that a third party is the owner, then probably not sure.


Cloud security based on the location as a concept disappears, since the exact location of the building, room, frame, drive (device) data cannot be identified. Which is good: there is someone who manages data, someone who probably has one bigger budget and more resources devoted to protect them against external attacks, other customers, or even your own provider.


There is also another factor that we call it alien disinterest: cloud service providers do not know the context of the data or the value that we give, which can greatly reduce internal threats. But are they concerned also for your safety? The cloud service providers know that it is in their own interest establish controls that impose sufficient separation between their administrative tasks and data of their customers. Controls that also make the cloud a difficult access platform for those seeking to steal data or launch attacks.

Decisions on safety are taken from an optimum assessment of the risk you get the right balance, making fair concessions. It is interesting to check their risk management strategies with the provider. The best will be happy to share them, because you know that it is the way to earn the trust of customers. Likely have been laid down and eliminated risks where others had not even thought.