New business model for cloud computing storage technology

Source: Internet
Author: User
Keywords Cloud computing storage technology cloud computing storage technology

Cloud storage technology How to better grasp the user's heart, this problem has a lot of manufacturers are studying, in fact, this is the current market a new business model. Cloud computing storage technology and cloud storage are becoming more viable, but there are still some problems-including security.

The terminology of cloud storage technology and cloud storage has become more and more popular in the past year, becoming the winner in the market war. However, to keep people familiar with long-term and stable development is only the first step, IT professionals and business executives understand that market focus on a term is just the beginning of delivering real functionality and value.

Because the terminology is relatively new, the definition of cloud computing storage technology is different. Recently, cloud computing has become a symbol of delivering IT resources as a service from local or offsite devices. Cloud computing can be delivered in a variety of ways, including the use of proprietary devices within the same company to the user, the general public or mixed mode.

The fundamentals of cloud computing storage technology have been to liberate companies from the capital costs of IT equipment, ultimately saving money and delivering IT services at lower cost than traditional it methods. Various types of cloud computing storage technologies include: delivering applications or core it as a service, distributed software as a service (SaaS) and it as a service (ITaaS).

Nevertheless, is cloud storage technology real? If so, when will it bring tangible benefits to IT companies? In order to answer these questions, it is necessary to check the current cloud and cloud storage.

A new business model

The idea of it as a service (ITaaS) is once again a reality. Although this is not a new concept and has been moving in various forms to the market, it is once again accepted as a mainstream business practice. In fact, ITaaS was the main business model in the past 50 and late 60, when it equipment was too expensive for businesses to have their own equipment. Over time, suppliers continue to reduce prices, the enterprise began to have their own equipment, and operate themselves.

More recently, this trend towards ownership of all IT resources has been fading away, instead of turning to services. In particular, over the past decade, individuals have become increasingly reliant on internet services. As consumer confidence continues to grow, these same individuals are already looking for ways to leverage it for their business services. As a result, people are accepting that IT services are growing.

One of the biggest changes in the past decade has been personal change, followed by business enterprises, who are willing to accept and use the Web services provided. In the 2000, few companies considered outsourcing as important as their customer relationship management (CRM) or email. Many companies have seen the business importance of CRM and e-mail, and outsourcing is generally rarely used, and these services on the Web have been viewed more as pagan in the 2000. However, in 2009, the provision of these services through a remote service provider became routine.

Technical issues

Several technical issues in providing it as a service hinder past efforts, including virtualization, management, security, billing and money recovery. These four characteristics are a key part of the delivery ITaaS.

To a large extent, many of the technical problems that have hindered itaas have been solved in the past decade, but there are still some problems. Security, for example, still requires more attention.

Some of the remaining challenges are part of the technology and how businesses choose to use the service. These include the speed of accessing IT resources, the availability of services, and security.

Speed problem

For many, cloud computing storage technology and cloud storage bring the meaning of public access to remote resources, which is the cloud metaphor. As terminology develops, cloud computing is also used to describe other phenomena, in addition to accessing local or private resources outside of remote services.

Some aspects of cloud computing storage technology are no less affected than others. Processing large data suites requires high-speed connections between processes and storage. One of the basic principles of the network is that long-distance connections are much more expensive than local connections at the same speed.

Therefore, when dealing with large amounts of data, applications and data will naturally approach each other. The more important the application, the more data, the greater the likelihood that data and applications will be together. For applications that do not require rapid processing, or for small data suites, data may be stored further.

Just as it data centers do not separate their servers and storage systems by hundreds of of miles, cloud storage technology does not separate components over long distances for critical applications.

Therefore, for many places, the speed of network access will no longer be a problem, as data and applications will be placed close to private itaas or publicly provided environments.

Availability and Reliability

Availability is a combination of the final ITaaS required for successful delivery of other technical components. The availability and reliability of service delivery is a business problem as well as a technical issue. Technical availability requires it providers to take into account the internal and the cloud, and design a solution that matches almost any requirement at a specific price. In addition, availability should not be a problem, but rather a level of availability at a specific price.

Accept service level and corresponding price difference continuously improve ITaaS mature business model. As with local IT services, the cost of availability services at all levels will be significantly higher than before. The availability service level is primarily a discussion of "9 S". Two 9 of service levels represent 99% uptime, with annual downtime of less than three days (87 hours). Five 9 or 99.999% represents a five-minute downtime per year.

At present, many of the service level is a "one-size-Fits-all." These providers usually have only one or two levels and cannot modify contracts and service levels. This approach lacks flexibility to meet the specific requirements of many enterprises.

Ultimately almost any level of availability can be provided if consumers are willing to pay for services. With the increasing supply of ITAAS suppliers, the flexibility of contract and price competition will improve the service level and meet the price requirements of ITaaS users.

Cloud Computing Storage Technology security

So far, security issues are a concern for most potential cloud storage users.

One is the lack of control over the connectivity of cloud storage or cloud computing resources on the network. As a result, users assume that all transmitted data may be intercepted or changed. As a result, any sensitive information such as login IDs and passwords should be protected. This security issue is now a cloud service, typically provided by e-mail and CRM main applications.

About security, there are roughly four elements 1. Certification; 2. Authorization; 3. Access control; 4. Audit.

In the past, security meant perimeter security, ensuring that unauthorized access was not allowed around the perimeter. In a virtual world, through virtual IT services, a physical perimeter has ceased to exist. Therefore, the enterprise must assume that all transmitted data may be potentially intercepted.

There is no physical control on a system, and the execution of these rules must rely on other methods to restrict access to information. Encryption is an important way to restrict access to meaningful information. As a result, encryption becomes an important component of security when it services are delivered through the cloud.

The problem with cloud storage is particularly challenging, as cloud storage technologies are stored and saved in encrypted form. If the encryption key itself is lost or corrupted, the data itself is lost or damaged accordingly. For this reason, cloud storage and cloud security are more challenging than general cloud security.

Cloud computing storage technology in the network to transmit data, there are other problems, but also different countries to provide different access, search, confiscation of data regulations. European privacy laws are different from those in the United States. When a lawsuit, subpoena or national security issue occurs, the transfer of data to a state or through another country may affect government or business information access.


Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.