Abstract
“Innovation is necessary to ride the inevitable tide of change”.
The buzzword of 2009 seems
to be "cloud computing."
The cloud is a futuristic platform that provides dynamic resource pools,
virtualization, and high availability and enables the sharing, selection and
aggregation of geographically distributed heterogeneous resources for solving
large-scale problems in science and engineering. Users
may not have any knowledge, expertise, or control over the technology
infrastructure in the cloud.
In the
world where anyone can connect to internet the exponential increase in the
volume of information and connected devices creates a dilemma: IT complexity
increases as does demand for simplicity. This challenge calls for a more
dynamic and secure delivery model that enables rapid innovation for
applications and services. But with this ever developing cloud concept,
problems are arising from this “golden solution” in the enterprise arena.
Preventing intruders from attacking the cloud infrastructure is the only
realistic thing the staff, management and planners can foresee.
The
fear is that this technology is difficult to learn, IT administrators would
lose their jobs because datacenters would shrink in size, and system engineers
wouldn't be able to learn the "new skills" required. Recently Microsoft
Corp took the wraps off a new service in which it will start previewing "Windows Azure," a platform based
on cloud that allows third-party Web developers to host, manage, calculate and
store data for applications running on the Internet. But is it secure to
prevent is still a question. While cloud providers
like Amazon will attempt to provide management abstractions shielding us from
the virtual systems, if we drill down into our system, we'll soon see
virtualization. So building up virtualization skills is a prerequisite for
moving to cloud computing.
In conclusion, regardless
of company size or volume and magnitude of the cloud, it explains how maneuver IT virtualization strategy could be
used in responding to a denial of service attack launched on DISA
datacenter hosted DoD applications. After picking up a grossly abnormal spike
in inbound traffic, targeted applications could be immediately transferred to
virtual machines hosted in another data center. We’re not reinventing the wheel. We have lots of technology and
standardized solutions we can already use to engineer into the stack. We
are just introducing them in the way least expected.
No comments:
Post a Comment