Feeds

Any clouds in your sky?

Hype aside, is there anything in this cloud computing lark?

  • alert
  • submit to reddit

High performance access to file storage

When the BBC features a cloud computing piece on its news bulletin (28 October), you know the hype is beginning to bite. But does the idea have substance or was Microsoft's Azure announcement just a handy lead-in to the weather on a slow news day?

The broadcasters made it sound so easy. Containers full of servers and all the other bits and bobs bolted together quickly in cool locations with a ready supply of electricity and whacking great internet connections. Then, instead of having to run applications on your own machines, kind-hearted suppliers can say "let us run them for you." In exchange of course, for a continuous revenue stream instead of periodic revenue bursts in exchange for ever larger bloatware.

Sounds easy doesn't it? But somehow, you have to get from where you are to where you want to be. You can't just say to a provider, "oi, move this lot to the cloud for me." You probably need to get your own house in order first. Some applications and data shouldn't even leave your premises. Well, not without a monumental degree of trust and a very close working relationship with your cloud service provider.

It's probably better to move out the less sensitive stuff first, especially if it has erratic peaks and troughs of demand. In fact, you probably do this already, to a certain extent. Email security perhaps. Or SalesForce.com. What about those new-fangled social computing services. Or perhaps you've got servers being hosted on your behalf.

Cloud computing services come in several guises but broadly they provide you with an infrastructure, an application or a platform. Azure, the thing that started this piece off, is really an application platform. At the moment it is of most interest to developers. But it did give the news people an excuse to puff cloud computing in general.

But, what about your life? Do you have anything to do with cloud computing? Inside or outside work. As ever, we're trying to distinguish between hype and reality. A word or two from you would be very welcome. Just click on 'Post a comment'. Thank you.

High performance access to file storage

More from The Register

next story
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.