Remember meForgot password?
    Log in with Twitter

article imageOp-Ed: Cloud computing deployment models and applications

By Anthony Carranza     Aug 5, 2014 in Technology
Increasingly businesses of all sizes from different industries are adapting to the digital revolution the Internet has brought along with it.
Among the toughest challenges to muster is the ability to choose the appropriate deployment cloud model that fits the company’s long-term goal and how it can handle safely the security of data.
The different cloud services offered depend on the organizational structure of the company. Each business within different industries has a set of needs and demands to operate cost-effectively and efficiently. Typically the four deployment models in cloud computing include the following: public cloud, private cloud, community cloud and the hybrid cloud.
The type of deployment like “Public Cloud” as the name indicates it can be available either for free or as a pay-per-use basis. According to the International Data Corporation (IDC) the total public cloud services industry revenue from basic storage to software as a service (SaaS) was 45.7 billion in 2013. It is estimated by Gartners for public cloud services market will leap to 210 billion by 2016.
On the other hand, a private cloud service works a little different with services being deployed and implemented on a client’s existing private networks. Through the implementation within the firewall it remains under the control of the Information Technology (IT) department providing close supervision over the company’s data, according to
Community cloud services operate in and share the resources amongst the parties involved to limit operating costs. Consider it a multi-tenant cloud infrastructure where the one cloud is being utilized by mutually beneficial users. The organization may use a public or private deployment scheme as it sees fit for the business. The difference with a private cloud costs more.
Unlike the previous services, the hybrid cloud concept as the name indicates is a combination of two or more models (private, public and community). There is a strong possibility that 50 percent for large enterprises will increasingly adopt the hybrid approach and migrate to this model over the course of a couple years. Business wire predicts that global hybrid cloud market share will grow at a five year compound annual growth of 30 percent (from 2013 to 2018).
Four fundamental cloud security stages
In order to implement the best security plan it is best looked at in a systematic yet complex fashion. According to the Israeli start-up FortyCloud-multi-layered private cloud provider blog post explains a reliable model of security for organizations who consider go through the steps of establishing within their infrastructure solid cloud security.
The four stages would be as follows: security best practice in the cloud, scale & automation security, multi-region or multi-cloud deployments and compliance with security.
Whatever the company lay out may be in terms of a multi-cloud deployment strategy with for example several data centers have to be monitored very closely. In addition, overseeing all of this flow of data will be challenging to secure all of this mass of information flowing in and out.
Security configurations will vary from one institution to the next, but safeguarding the information is essential for its own survival.
The first three stages is starting point for almost any organization, group or start-up when considering any sort of cloud services provider.
Cloud provider market share is maturing and so is the need to offer the best possible model that is easy to deploy for the business with the best competitive price.
Emerging trends in cloud computing through 2015
The ever-increasing growth of mobile devices has fueled the convergence of Mobile Cloud Computing (MCC) and cloud computing altogether. By the time 5G mobile networks arrive terabytes of information will be flowing from an organization’s cloud and central servers maximizing the adoption of technology in its entire business operation.
It is estimated come around 2015 there will be 1 trillion cloud-ready devices and most users will be working from cyberspace-based applications, asserts a post by the IEEE Communications Society.
This transition to a cloud-based model is being adopted by industry related communities and the academic sector.
The trend continues to rise since the costs of a adopting a hybrid, community, private or public deployment model fits practically just about any organization looking to tap the power of the Internet as a resource.
All of these applications or software related packages will force the full integration of a comprehensive security plan. This will help run operations more smoothly without having to divert enormous investments in large IT departments and security software solutions. This in the long run can help aid or protect the flow of information, ensure privacy and security of exchange amongst the parties interacting in the cloud.
This opinion article was written by an independent writer. The opinions and views expressed herein are those of the author and are not necessarily intended to reflect those of
More about Cloud computing, Network, Servers, Virtual
More news from
Latest News
Top News