“Innovation is necessary to ride the inevitable tide of change”.
The buzzword of 2009 seems to be "cloud computing." The cloud is a futuristic platform that provides dynamic resource pools, virtualization, and high availability and enables the sharing, selection and aggregation of geographically distributed heterogeneous resources for solving large-scale problems in science and engineering. Users may not have any knowledge, expertise, or control over the technology infrastructure in the cloud.
In the world where anyone can connect to internet the exponential increase in the volume of information and connected devices creates a dilemma: IT complexity increases as does demand for simplicity. This challenge calls for a more dynamic and secure delivery model that enables rapid innovation for applications and services. But with this ever developing cloud concept, problems are arising from this “golden solution” in the enterprise arena. Preventing intruders from attacking the cloud infrastructure is the only realistic thing the staff, management and planners can foresee.
The fear is that this technology is difficult to learn, IT administrators would lose their jobs because datacenters would shrink in size, and system engineers wouldn't be able to learn the "new skills" required. Recently Microsoft Corp took the wraps off a new service in which it will start previewing "Windows Azure," a platform based on cloud that allows third-party Web developers to host, manage, calculate and store data for applications running on the Internet. But is it secure to prevent is still a question. While cloud providers like Amazon will attempt to provide management abstractions shielding us from the virtual systems, if we drill down into our system, we'll soon see virtualization. So building up virtualization skills is a prerequisite for moving to cloud computing.
In conclusion, regardless of company size or volume and magnitude of the cloud, it explains how maneuver IT virtualization strategy could be used in responding to a denial of service attack launched on DISA datacenter hosted DoD applications. After picking up a grossly abnormal spike in inbound traffic, targeted applications could be immediately transferred to virtual machines hosted in another data center. We’re not reinventing the wheel. We have lots of technology and standardized solutions we can already use to engineer into the stack. We are just introducing them in the way least expected.