Feeds

Hybrid clouds 2012: the private cloud myth lives

Marketeer snake oil for scared CIOs

High performance access to file storage

Hybrid clouds are all the rage in cloud computing today, with Gartner naming them "a major focus for 2012", even as hybrid clouds constitute fully 20 per cent of enterprise clouds today. But are they really anything more than a new face on private clouds? Marten Mickos, chief executive of private cloud company, Eucalyptus Systems, doesn't think so.

As Mickos pointed out to me over email, private clouds don't actually make sense unless they have a hybrid ability. Yes, he went on to say, there are and will always be some specific private clouds that are private and only private. But they are few and far between.

So why do we make the private/hybrid distinction?

Marketing. Early on, risk-averse CIOs needed to hear comforting words from the cloud computing industry that all their sensitive data wouldn't be hosted in an Amazon data center. Because, you know, data centres among other things deliver perfect uptime and are impervious to security breaches. Or maybe Not. So they were told that they could get all the benefits of cloud computing by building their own private clouds.

Which is, of course, utter and complete nonsense.

Many of the benefits of cloud computing go out the window the minute a CIO runs a cloud behind their firewall, as Amazon has cogently argued. And Amazon and other public cloud providers are arguably better positioned to invest in uptime and security than isolated enterprises.

For these and other reasons, CIOs are increasingly looking to hybrid clouds that blend the benefits of private clouds with public clouds. The ways in which this happens are myriad and include:

  • Develop on public, deploy on private
  • Develop on private, deploy on public
  • Deploy first on public, then move workload to private
  • Deploy first on private, then move workload to public
  • Share workloads across clouds (cloudbursting)
  • Run sensitive or data-intensive workloads on private, and other workloads on public
  • Use one cloud as a back-up for the other
  • Use private clouds as back-ups for other private clouds

At a certain point, the distinction between private/public/hybrid becomes unhelpful. With a common API - one claim to fame for Eucalyptus is its tight adherence to the Amazon API, which makes it easy to move workloads between Amazon Web Services and Eucalyptus private clouds - hybrid clouds become both easy and standard fare. Perhaps the distinction is necessary for CIOs anxious to keep track of all their cloudy assets, something that HP warns is harder and more critical in the cloud.

And, yes, there is an important technical difference between public and private clouds: public clouds are typically built on absolutely homogeneous infrastructure with - among other factors - just one type of CPU, one type of operating system and one type of hypervisor. Private clouds need to operate on top of highly heterogeneous infrastructure. For this reason, the software design must be different.

Still, as Mickos points out:

In a philosophical sense, the delineation between public and private cloud isn't that clear. Seen from planet Mars, Amazon Web Services looks like a private cloud. Red Cloud of Cornell University is a private cloud in many ways. But it is open to all researchers, so you could also say it's a public cloud.

As of today, there aren't that many hybrid clouds in production. But there are some, both from Eucalyptus and others like VMware. And this isn't surprising, since there aren't many publicly referenced private clouds in production, either.

But rest assured, when they do get announced, they're likely to have a hybrid component to them. Because that's exactly what private clouds are, or very soon will be: hybrid clouds. To adopt the cloud completely behind the firewall is something that might make sense in a white paper, but it's unlikely to drive the efficiencies and agility that increasingly drive cloud computing adoption. Hybrid is the new private. ®

Matt Asay is senior vice president of business development at Nodeable, offering systems management for managing and analyzing cloud-based data. He was formerly SVP of biz dev at HTML5 start-up Strobe and chief operating officer of Ubuntu commercial operation Canonical. With more than a decade spent in open source, Asay served as Alfresco's general manager for the Americas and vice president of business development, and he helped put Novell on its open source track. Asay is an emeritus board member of the Open Source Initiative (OSI). His column, Open...and Shut, appears three times a week on The Register.

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.