Virtualized vs Dedicated Cloud Computing Resources
Cloud computing providers cannot provide dedicated resources because all cloud services are on shared resources.”
Cloud providers come in many varieties, some offer only dedicated resources, some offer only shared models, and some offer hybrid solutions consisting of both types. It is important for the buyer to research which architecture is best for the problem that they are trying to solve. There is no one correct answer.
Some architectures will require dedicated cloud computing resources due to SLA agreements with end-users, compliance reasons or corporate standards. However, this is not true for all architectures. A well-educated cloud architect can help distinguish between what is assumed to be needed and what is actually needed.
Once a cloud provider is selected it is nearly impossible to switch to another provider.”
Cloud vendors vary in architecture, technology and much more. The issue with being locked-in to a vloud provider can be reality, but it is up to the customer to make the best educated decisions. If vendor lock-in is a concern, just as it is with all software/hardware purchases, then choose a vendor that has a cloud based on industry standards that support easy transitions. The vast majority of cloud providers have built their architectures using industry standards that allow cloud interoperability. Vendor lock-in is something that should be discussed up front when you are choosing a cloud service in order to avoid short and long term obligations to purchase or use a specific product in order to access your data.
The lack of a fixed investment means that organizations are much less likely to be locked in to a specific vendor than with in-house solutions.
Cloud Computing is inherently less secure than providing solutions in my company’s buildings using our standard security systems.”
Cloud computing security is an open ended discussion that is extremely dependent on the problem to be solved and which cloud provider is chosen. Each problem will have specific security requirements and each cloud provider and cloud Layer (PaaS, IaaS, SaaS, and more) has their own security designs and concerns. It is very possible to improve the security of a given architecture by moving to cloud computing.
Many leading cloud infrastructure service providers deploy best-in-class security solutions and multi-level redundancies to protect against breach and service failures. The costs associated with providing these heightened levels of security are often beyond what many private organizations can afford. In these cases, the security profiles are improved for the applications that are moved to The Cloud.
Cloud computing providers cannot control or specify where customer data is stored geographically.”
The customer is in full control of where their data resides. This is because the customer’s administrators choose the cloud provider. If the provider does not meet the needs of the organization, then do not select that provider. Many cloud providers give the organization control over their data’s location but these needs to be defined through SLAs and contracts if it is a requirement.
Maturity of Cloud Technologies
Cloud computing offers nothing new and is no different than traditional IT outsourcing.”
The cloud computing model is a natural evolution of the traditional IT outsourcing model. Many advances have been made in provisioning and virtualization technologies that have enabled several advantages over traditional IT outsourcing.
Cloud computing infrastructure is dynamically provisioned from huge pools of shared IT resources in a pay-per-use model. So the right IT supply can be flexed up and down to better match unpredictable customer demand. What can result is a reduction in IT costs to support business activities like building new products, serving customers, and managing operations. New initiatives can be started or stopped quickly, without depleting IT budgets or disrupting core business. The unique flexibility of cloud computing can be especially powerful in accelerating innovation for companies looking to expand into new markets, or acquiring and divesting other businesses as a strategy for growth and market leadership.