Forecast: Cloud Computing Looms Big on the Horizon

Total Page:16

File Type:pdf, Size:1020Kb

Forecast: Cloud Computing Looms Big on the Horizon CIO Focus Executive guides for strategic decision making Forecast: Cloud Computing Looms Big on the Horizon TABLE OF CONTENTS INTRODUctiON OVERVIEW 3 | QuickStudy: Cloud Computing 4 | What Cloud Computing Really Means PUTTING IT TO WORK 6 | Cloud Computing: Tales from the Front 8 | Capex vs. Opex 9 | Cloud Computing: Don’t Get Caught Without An Exit Strategy 12 | Early Experiments in Cloud Computing 14 | Cloud Computing: What UC Berkeley Can Teach You RISK/REWARD 17 | The Dangers of Cloud Computing 18 | Cloud Computing Survey SPONSORED BY http://vmware.com INTRODUCTION Forecast: Cloud Computing Looms Big on the Horizon “Cloud computing” is basically the latest incarnation of grid computing, util- ity computing, virtualization and clustering. It differs in that it provides the ability to connect to software and data living on the Internet (the cloud) instead of on a hard drive or local network. Since IT is always on the lookout for new and better ways to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software, cloud computing holds much promise. It is, however, still in a nascent stage, and it behooves IT management to look closely and carefully at what’s involved and whether or not the concept is a workable one for the company. What follows is a compendium of articles about cloud computing in which we explore the current state of the art, early adopters, the economics, the potential pitfalls and what you can do to avoid them, and what IT leaders are saying about the concept. This is one time when it makes good, practical business sense to have your head in the clouds. All content copyright CXO Media Inc., 2009. All rights are reserved. No material may be reproduced electronically or in print without written permission from CXO Media Inc., 492 Old Connecticut Path, Framingham, MA 01701. CIO FOCUS FORecAST: CLOUD COMPUTING LOOMS BIG ON THE HORIZON 2 locations was transmitted. OVERVIEW Also, grid or cloud computing means users and busi- nesses must migrate their applications and data to a third party or different platform. For enterprises with huge invest- Quick Study: Cloud ments in existing software and operational procedures, this has been a real barrier to adoption of these shared technolo- Computing gies. Other significant concerns include data security and confidentiality. Users can hook into the Why it works power of “out there” Critical to the success of cloud computing has been the growth of virtualization, allowing one computer to act as if sk any five IT specialists what cloud computing it were another—or many others. Server virtualization lets is, and you’re likely to get five different answers. clouds support more applications than traditional comput- AThat’s partly because cloud computing is merely ing grids, hosting various kinds of middleware on virtual the latest, broadest development in a trend that’s been grow- machines throughout the cloud. ing for years. Cloud computing is the most recent successor to grid Where it’s going computing, utility computing, virtualization and cluster- If cloud computing succeeds on a wide scale, it may well ing. Cloud computing overlaps those concepts but has its be because of recent initiatives from Amazon, IBM and own meaning: the ability to connect to software and data Google. on the Internet (the cloud) instead of on your hard drive or In 2007, IBM and Google Inc. teamed up to provide local network. the hardware, software and services needed to teach com- To do anything with a PC 10 years ago, you needed to buy puter science students large-scale distributed computing. and install software. Now, cloud computing allows users to Their Academic Cluster Computing Initiative began when access programs and resources across the Internet as if they a Google software engineer, Christophe Bisciglia, wanted were on their own machines. to improve computer science curricula by teaching college students how to solve problems involving massive computer Definition clusters and terabytes of data. Cloud computing describes a system where users can con- nect to a vast network of computing resources, data and Why a cloud? servers that reside somewhere “out there,” usually on the For years, in flow diagrams and PowerPoint presentations, Internet, rather than on a local machine or a LAN or in a people have represented the Internet as a fuzzy cloud with data center. Cloud computing can give on- demand access communications lines going in and out of it. Now that they’re to supercomputer-level power, even from a thin client or actually talking about using a remote, black-box approach mobile device such as a smart phone or laptop. to computing, the old familiar cloud seems an appropriate metaphor. In the beginning Google’s CEO recruited his counterpart at IBM to join First, there were mainframe computers, then minicom- the initiative. The two companies say they will dedicate puters, PCs and servers. As computers became physically hundreds of computers to it. Located in data centers at smaller and resources more distributed, problems some- Google, IBM’s Almaden Research Center and the University times arose when users needed more computing power. of Washington, these resources are expected to eventually IT pros tried clustering computers, allowing them to talk include more than 1,600 processors. with one another and balance computing loads. Users didn’t Initially, six universities—the University of Washington, care which CPU ran their program, and cluster software Stanford University, Carnegie Mellon University, MIT, the managed everything. But clustering proved to be difficult University of Maryland and the University of California, and expensive. Berkeley—are participating in the Google-IBM program. In the early 1990s, the grid concept emerged: Users could There are lots of discussions going on right now about connect to a network, much as they plugged into the electri- cloud computing is, but I feel there isn’t enough definition cal power grid, and use service on a metered-utility basis. of what it isn’t. Thus, people began speaking of utility computing. Meanwhile, Amazon.com Inc. offers a couple of cloud One problem was where data was stored. Grid nodes services. Web service developers can use its Simple Storage could be located anywhere in the world, but there could Service (S3) to store any amount of data. And developers be significant processing delays while data stored at other can use Amazon’s Elastic Compute Cloud (EC2) to set up a CIO FOCUS FORecAST: CLOUD COMPUTING LOOMS BIG ON THE HORIZON 3 OVERVIEW virtual server in minutes, with none of the maintenance of emerging. buying and installing server hardware and software. Both InfoWorld talked to dozens of vendors, analysts, and IT services are offered on a pay-per-use basis. n customers to tease out the various components of cloud computing. Based on those discussions, here’s a rough Russel Kay is a Computerworld contributing writer in Worcester, breakdown of what cloud computing is all about: Mass. You can contact him at [email protected]. 1. SaaS This type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means What Cloud Computing no up-front investment in servers or software licensing; on Really Means the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applica- The next big trend sounds tions, but SaaS is also common for HR apps and has even nebulous, but it’s not so worked its way up the food chain to ERP, with players such fuzzy when you view the as Workday. And who could have predicted the sudden rise of SaaS “desktop” applications, such as Google Apps and value proposition from the Zoho Office? perspective of IT professionals 2. Utility computing loud computing is all the rage. “It’s become the The idea is not new, but this form of cloud computing is phrase du jour,” says Gartner senior analyst Ben getting new life from Amazon.com, Sun, IBM, and oth- CPring, echoing many of his peers. The problem is ers who now offer storage and virtual servers that IT can that (as with Web 2.0) everyone seems to have a different access on demand. Early enterprise adopters mainly use definition. utility computing for supplemental, non-mission-critical As a metaphor for the Internet, “the cloud” is a familiar needs, but one day, they may replace parts of the datacenter. cliché, but when combined with “computing,” the meaning Other providers offer solutions that help IT create virtual gets bigger and fuzzier. Some analysts and vendors define datacenters from commodity servers, such as 3Tera’s App- cloud computing narrowly as an updated version of utility Logic and Cohesive Flexible Technologies’ Elastic Server on computing: basically virtual servers available over the Inter- Demand. Liquid Computing’s LiquidQ offers similar capa- net. Others go very broad, arguing anything you consume bilities, enabling IT to stitch together memory, I/O, storage, outside the firewall is “in the cloud,” including conventional and computational capacity as a virtualized resource pool outsourcing. available over the network. Cloud computing comes into The Cloud: Your View focus only when you think about Cloud computing will cause a radical 58% 3. Web services in the cloud what IT always needs: a way to shift in information technology driving Closely related to SaaS, Web increase capacity or add capabili- the next wave of innovation service providers offer APIs ties on the fly without investing in Cloud computing is an evolving concept 54% that enable developers to exploit that will take years to mature new infrastructure, training new functionality over the Internet, personnel, or licensing new soft- Current on-demand offerings are not 36% rather than delivering full-blown appropriate for my business ware.
Recommended publications
  • Cisco Unified Computing System Pricing
    Data Center In A Box Event Management Size Matters Liquid delivers a total Prism provides high-end But there’s more package p.34 features on a budget p.39 to choosing hardware p.42 A SPECIAL ALL-DIGITAL ISSUE November 2009 Unified systems combine servers, networking, storage, and management and put IT back in control. p.12 Green Dreams High efficiency is good Sponsored by for business, provides stellar PR —and is within reach p.26 << Previous C Network For IT, By IT C Network CONTENTS For IT, By IT >> Network Computing’s second all-digital issue Cover Story NEXT-GEN DATA CENTER, DELIVERED The unified computing platforms of today promise to consolidate everything and anything into a single chassis. And the vendors with the biggest R&D budgets are succeeding at this task.p.12 ENERGY-EFFICIENT INSIGHTS DATA CENTERS News Bits And Bytes Was your data center designed HP trades punches with Cisco; Juniper in the last five years? If not, has a new software platform, hardware, it’s not as efficient as it could and partners; businesses stumble on be. Brush up on the basics encryption; Q&A with HP’s Paul Congdon.p.8 of effective designs.p.26 REVIEWS A True Data Center In A Box Early adopters of the LiquidIQ virtual server say it’s reduced setup and reconfigure time, and let them cut back on high-priced staff.p.34 EventTracker Adds Much-Needed Monitoring The latest version of Prism’s security incident and event management offering makes up for old shortcomings.p.39 2 November 2009 networkcomputing.com << Previous Next >> ENTS NetworkComputing.com AROUND THE WEB Open Source You Can Use Two ways to browse the Web, and one great way to find everything scattered across all your storage media.
    [Show full text]
  • Oracle Magazine May/June 2008 3
    DOES YOUR BUSINESS HAVE A HEART? Data. It’s at the very heart of your business. Your data holds your best ideas, your plans for the future. And when your data is on NetApp, your entire business pulses with strength and feels the beat. Ideas fl ow, breakthroughs happen, markets are tapped—and even created. At NetApp, we’re committed to bringing you storage and data management solutions built to keep the heart of your business beating with strength and effi ciency. Learn how we help your business go further, faster. Visit netapp.com/heart. © 2008 NetApp. All rights reserved. Specifi cations subject to change without notice. NetApp and the NetApp logo are registered trademarks of NetApp, Inc. in the U.S. and other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. Untitled-10 1 3/18/08 9:17:38 PM MAY/JUNE 2008 ORACLE.COM/ORACLEMAGAZINE DEVELOPER NATION THE CHOICE OF ARCHITECTURE, STANDARDS, AND TOOLS UNITES THE ORACLE ENTERPRISE APPLICATION DEVELOPER COMMUNITY WRAP IT UP /36 ENERGIZING THE EFFICIENT ENTERPRISE /41 ENLIGHTENED DEVELOPMENT /44 THE POWER OF TWO /47 MJ08_Cover_02.indd 5 3/24/08 3:00:13 PM Project2 3/18/08 1:19 PM Page 1 .red.de www Best-in-class architecture © 2008 Fujitsu Limited. All rights reserved. Fujitsu, the Fujitsu logo and PRIMEQUEST are registered trademarks or trademarks of Fujitsu Limited in the United States and other countries. All designations used in this document may be trademarks, the use of which by third parties for their own purposes could violate the rights of the trademark owners.
    [Show full text]
  • Magic Quadrant for Blade Servers
    Magic Quadrant for Blade Servers Gartner RAS Core Research Note G00207244, Andrew Butler, George J. Weiss, 17 January 2011, V3RA4 01202012 This Magic Quadrant for Blade Servers focuses on a market that is growing in complexity and sophistication, due to the emergence of related form factors, such as skinless servers, and the fast-growing interest in cloud computing, virtual input/output and fabrics. WHAT YOU NEED TO KNOW Blades represent an important stage in the evolution of servers as separate, discrete platforms give way to modular designs, and the boundaries between servers, storage and networking become increasingly blurred. This creates an increasing overlap of functionality between product categories that were previously more clearly delineated. These boundaries will be further tested as fabric-based computing becomes more prevalent, and all blade servers are examples of a fabric-enabled architecture, due to the switch-based backplane or midplane that they exploit. Blades represent a more proprietary investment, due to the lack of hardware form factor interoperability standards and the growing dependence on proprietary management tools and virtual input/output (I/O) solutions. Due to their modular nature, blades offer compelling operational benefits, such as improved cabling, rapid hardware provisioning, high compute density, energy-efficient design and increasing management automation. However, blades deliver few, if any, incremental application benefits, compared with their rack- and tower-based peers. Blades are not the only choice for modular deployment; rack-optimized servers deliver some modularity benefits, and skinless servers now represent an even more extreme class of high-density deployment. Because many vendors position their blade and skinless servers as part of a standard “modular server” portfolio, the nascent market status of skinless servers is reflected in this year’s blade server Magic Quadrant.
    [Show full text]
  • FOR IMMEDIATE RELEASE Liquid Computing Announces Liquidiq 3.0 Unified Computing System Powered by Intel® Xeon® 5500 Series
    FOR IMMEDIATE RELEASE Liquid Computing Announces LiquidIQ 3.0 Unified Computing System Powered By Intel® Xeon® 5500 Series Processors Enables Customers to Rapidly Scale New Services, Efficiently Manage Quality of Service and Dramatically Lower Operating Costs Ottawa, Canada – March 30, 2009 – Liquid Computing, a leader in unified computing infrastructure for the dynamic data center, today announced the LiquidIQ 3.0 unified computing system powered by Intel Xeon 5500 Series Processors. The Intel Xeon 5500 Series Processor, also known by the code name “Nehalem”, takes the powerful performance, agility, and operational cost saving benefits of LiquidIQ to a new level, providing customers with even more horsepower and bandwidth to run either multi-tier, data intensive applications or virtualized applications while significantly decreasing power utilization and reducing space consumption by 50 percent. “Intel and Liquid Computing share a common goal of driving innovation to help data centers more effectively support business demands while reducing operating costs,” said Doug Cooper, country manager, Intel Canada. “Powered by the Intel Xeon Processor 5500 Series, LiquidIQ 3.0 achieves this goal in unified computing for data centers that support both virtualized and bare metal operations with significant leaps in performance, space utilization, and power efficiency.” The LiquidIQ unified computing platform is already in use in customer data centers today and provides total control over the delivery and quality of the on-demand business applications they manage, while at the same time significantly reducing data center operating costs. LiquidIQ is standards-based, certified to support major operating systems, and is the only unified computing system designed from the ground up to support applications running on bare-metal and those running within virtualized environments.
    [Show full text]
  • Xerox Corporation 00-00-02
    00-00-00 (hex) XEROX CORPORATION 00-00-01 (hex) XEROX CORPORATION 00-00-02 (hex) XEROX CORPORATION 00-00-03 (hex) XEROX CORPORATION 00-00-04 (hex) XEROX CORPORATION 00-00-05 (hex) XEROX CORPORATION 00-00-06 (hex) XEROX CORPORATION 00-00-07 (hex) XEROX CORPORATION 00-00-08 (hex) XEROX CORPORATION 00-00-09 (hex) XEROX CORPORATION 00-00-0A (hex) OMRON TATEISI ELECTRONICS CO. 00-00-0B (hex) MATRIX CORPORATION 00-00-0C (hex) CISCO SYSTEMS, INC. 00-00-0D (hex) FIBRONICS LTD. 00-00-0E (hex) FUJITSU LIMITED 00-00-0F (hex) NEXT, INC. 00-00-10 (hex) SYTEK INC. 00-00-11 (hex) NORMEREL SYSTEMES 00-00-12 (hex) INFORMATION TECHNOLOGY LIMITED 00-00-13 (hex) CAMEX 00-00-14 (hex) NETRONIX 00-00-15 (hex) DATAPOINT CORPORATION 00-00-16 (hex) DU PONT PIXEL SYSTEMS . 00-00-17 (hex) TEKELEC 00-00-18 (hex) WEBSTER COMPUTER CORPORATION 00-00-19 (hex) APPLIED DYNAMICS INTERNATIONAL 00-00-1A (hex) ADVANCED MICRO DEVICES 00-00-1B (hex) NOVELL INC. 00-00-1C (hex) BELL TECHNOLOGIES 00-00-1D (hex) CABLETRON SYSTEMS, INC. 00-00-1E (hex) TELSIST INDUSTRIA ELECTRONICA 00-00-1F (hex) Telco Systems, Inc. 00-00-20 (hex) DATAINDUSTRIER DIAB AB 00-00-21 (hex) SUREMAN COMP. & COMMUN. CORP. 00-00-22 (hex) VISUAL TECHNOLOGY INC. 00-00-23 (hex) ABB INDUSTRIAL SYSTEMS AB 00-00-24 (hex) CONNECT AS 00-00-25 (hex) RAMTEK CORP. 00-00-26 (hex) SHA-KEN CO., LTD. 00-00-27 (hex) JAPAN RADIO COMPANY 00-00-28 (hex) PRODIGY SYSTEMS CORPORATION 00-00-29 (hex) IMC NETWORKS CORP.
    [Show full text]
  • SURVEY in Pursuit of Petascale Computing
    SURVEY In Pursuit of Petascale Computing: Initiatives Around the World Steve Conway Earl Joseph, Ph.D. Jie Wu Daniel Lee Richard Walsh Lloyd Cohen Charlie Hayes IDC OPINION The high-end high-performance computing (HPC) community has a penchant for marching toward milestones — the first sustained gigaflop (circa 1989), the first sustained teraflop (circa 1998), and now the first sustained petaflop. The pursuit of each milestone has led to important breakthroughs in science and engineering. Today, leading HPC sites have begun to identify applications that will benefit from petascale performance. Governments around the world, in partnership with HPC vendors, have launched initiatives to support the development and deployment of petascale systems. Much has already been written and spoken about the challenges and benefits of petascale computing; meanwhile, the U.S. Department of Energy, its labs, and DARPA are actively exploring requirements for the next milestone — exascale computing. Highlights of our analysis are as follows: The petascale era will arrive in stages — peak petaflop systems (late 2007– 2010), Linpack petaflops, sustained petaflops on "embarrassingly parallel" applications and, finally, sustained petaflops on challenging applications. Gone is the era when only the United States and Japan had the wherewithal to develop and deploy the highest-performing class of HPC systems. Petascale initiatives also exist in Europe and China — although the U.S. and Japanese initiatives are the most fully conceived and may still be the highest performers. Petascale architectures will range from ultralarge clusters to "hybrid" designs that aim to deliver more performance by coupling together (loosely or tightly) multiple processor types via high-bandwidth interconnects.
    [Show full text]
  • Managing Virtual Server Environments Analytics Report
    April 2008 The New Sprawl: Managing Virtual Server Environments Analytics Report Even as virtualization succeeds in limiting the number of physical servers in the data center, rampant VM growth is threatening to turn back our hard-won gains. The answer is strong management, but where to find it? By Joe Hernick InformationWeek Analytics Reports InformationWeek Analytics | Managing Virtualization 2 TABLE OF CONTENTS 4 Author’s Bio 5 Executive Summary 6 Research Synopsis 7 The New Sprawl: Managing Virtual Server Environments 8 Too Much Too Fast: State Of VM Deployments 9 Open Field: Heterogeneity In The Virtual Data Center 11 “VMotion Sickness:” A New Malady 12 Managing Your VMs 13 Inhibitors: Some Are Still Wary 14 Economics Of Virtualization 16 No Way To Treat An Infrastructure 19 What You Can Do Now: Constructive Steps 20 What’s Here Now: The Outlook For Tools Month 2008 © 2008 InformationWeek, Reproduction Prohibited InformationWeek Analytics | Managing Virtualization 3 TABLE OF FIGURES 7 Figure 1: Virtualization Hosts In Production 7 Figure 2: Virtualized Servers In Production 8 Figure 3: Primary Server Virtualization Platform 9 Figure 4: Server Virtualization Platforms by 2009 10 Figure 5: Usage Of VM Mobility Tools 11 Figure 6: Percentage Of Servers Virtualized By 2010 13 Figure 7: Usage Of A Structured Migration Plan 14 Figure 8: Most Important Virtualization Management Funtionality 16 Figure 9: Current Virtualization Management Method 17 Figure 10: Projected Budget For Virtualization Management Tools, 2009 18 Figure 11: Top Virtualization Drivers Month 2008 © 2008 InformationWeek, Reproduction Prohibited InformationWeek Analytics | Managing Virtualization 4 Joe Hernick has covered virtualization, storage, operating sys- tems, voice, and other topics for InformationWeek, Network Computing, and other publications for seven years.
    [Show full text]
  • The Cisco UCS Is the Shape of Servers to Come. Something Like the Cisco UCS Is Simply a Logical Outcome When You Start Designing Servers with a Clean Sheet of Paper
    Innovate Cisco UCS Acceleration Initiative We're not just making servers, we're making server history. UCS Wins, Success Stories and Analyst Reports 2H FY 2011 Table of Contents What Customers Say Construction Tutor Perini Education Seattle University Enterprise Cisco Media Solutions Group Financial Services Winterood Securities Healthcare Moses Cone Health System NightHawk Radiology Services IT Services Alphawest Services Pty Ltd Dimension Data ECKD GmbH LaSalle Solutions Westcon Group, Inc Public Sector Taser Virtual Systems Service Provider Parentix PiNS What Analysts Say Gartner IDC EMA Current Analysis Yankee Group Forrester For more information and the latest updates, visit: http://www.cisco.com/go/ucs Customer Case Study Construction Company Changes Data Center Economics Tutor Perini Corporation built its new data center with Unified Computing System, reducing device count by 60 percent. EXECUTIVE SUMMARY TUTOR PERINI CORPORATION ● Construction ● Sylmar, California USA ● 7000 Employees CHALLENGE ● Reduce data center operating costs ● Simplify management ● Ensure application availability SOLUTION ● Consolidated servers, switches, and storage access from multiple data centers onto a single Cisco Unified Computing System ● Engaged Cisco Advanced Services for planning and deployment RESULTS ● Reduced device count by 60 percent ● Reduced power consumption by 38 percent ● Minimized thin client costs by supporting up to 30 users per server Challenge Tutor Perini Corporation is a leading civil and building construction company offering diversified general contracting and design/build services to private clients and public agencies throughout the world. Its services include general contracting, pre-construction planning, and comprehensive project management. Tutor Perini also offers self-performed construction services, including excavation, concrete forming and placement, steel erection, electrical and mechanical services, plumbing, and HVAC.
    [Show full text]
  • Magdeburger Journal Zur Sicherheitsforschung
    Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: 2192-4260 Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in the special edition „In Depth Security – Proceedings of the DeepSec Conferences“. Edited by Stefan Schumacher and René Pfeiffer The Compromised Devices of the Carna Botnet As used for the Internet Census 2012 Parth Shukla This article will showcase the latest analysis and the progress of industry collaboration on the problem of Internet facing devices that have default credential logins through telnet. The Carna Botnet, which was used to perform the first-ever map of the Internet – Internet Census 2012 – highlighted a major information security concern with devices that allow default credential login from the Internet by default. For more information on the Internet Census 2012, please refer to the anonymous researcher’s paper. A complete list of compromised devices that formed part of the Carna Botnet was obtained exclusively by Parth Shukla. This list is NOT publicly available from any source. This data was acquired directly from the anonymous researcher who performed the Internet Census. As confirmed by the researcher, AusCERT to date remains the only organization and researcher in the world that has the complete dataset. Relevant snippets of this data, however, have been provided to CERTs around the world in order to reduce the threat made explicit by the Carna Botnet. This article will provide a detailed analysis of all the different identifying information for each of the com- promised devices that formed part of the Botnet. This detailed analysis will showcase the prevalence of easily- exploitable devices in different countries, regions and in different manufacturers.
    [Show full text]