How to optimize and reconstruct the cloud computing industry

Source: Internet
Author: User
Keywords Cloud computing security self should

In fact, cloud computing is around us, and we are already practicing it. In the past few years, various large and medium-sized manufacturing enterprises have established a computing certification services, supply services, database services or enterprise data centers and other services. In a way, this is the initial stage of the enterprise's internal cloud. Although it was not explicitly referred to as cloud computing, it is called shared services.

To adapt to the trend of cloud computing, first of all, according to the framework of cloud computing, the infrastructure and application of enterprises to do the necessary carding, and analysis of problems, bottlenecks, risks in where? Critical assessment and grading of the various IT services required by the enterprise is one of the necessary preparations to transition to the cloud computing framework. During this period, the enterprise's network, bandwidth and other infrastructure for adaptability examination. Externally, telecom operators must adapt their services to cloud computing, and they themselves are first to try cloud computing, which provides a cloud connection between private cloud blocks for businesses, especially in many branch offices. With the increase of data volume and bandwidth, the development of mobile interconnection will require operators to go to cloud computing, otherwise its operation efficiency and mode are not long-term competitiveness. At the same time, telecom operators can also provide a platform for public cloud services, which have a natural advantage, mainly its credibility and credibility. We should pay close attention to the development of social infrastructure and the internal and external environment changes of cloud computing, and get the conditions matching with enterprise cloud computing.

Second, businesses need to study different types of cloud models (public, private, mixed) and different categories (SaaS, PaaS, IaaS) cloud services. Because the differences in these different types of cloud models are directly related to security control and accountability. can also through the necessary external IT consulting, to the situation of the enterprise targeted diagnosis and consultation, in order to achieve the enterprise to these cloud models, the actual needs of their own enterprises have their own views. In the application of cloud computing, companies need to make a clear assessment of their actual needs: Should the data center be integrated? Or do you need to put existing applications on the online service and share them with other branches of the company? The advice is: big companies are best to build private clouds from within themselves, while SMEs should focus on the public cloud platform. Foreign market data also show that the private cloud development of enterprises is higher than the public cloud. Because information is growing fast, companies in the future will definitely need more data center resources. China's big companies should first take advantage of existing servers, share resources better, and turn their internal architectures into clouds.

The 3rd is to take care of the enterprise's existing IT assets. Most companies have applied service-oriented principles in their application development departments in recent years, isn't cloud computing a service-oriented one? Cloud computing is just a logical service-oriented one. A highly distributed security implementation of SOA security principles, with centralized security principles management and choice, can be directly applied to cloud computing. The principle of using SOA in cloud computing does not require a redesign of principles, as long as there are transformations. Only by combining the actual needs of the enterprise planning, is the best planning; only take care of enterprise it inherent investment and infrastructure, the gradual transition to cloud computing development model, is a good, low-risk development model.

4th, the principle of gradual and steady progress must be upheld. Those who try to overturn the proposal, either with ulterior motives or irresponsible, such suppliers should be shut out. Companies should first seek solutions for cloud computing from older suppliers, which is the most economical way to learn and understand cloud computing. Decide whether to continue to use the original supplier or take this opportunity to seek a more suitable supplier. Because, any technological leap, will make the competitors floating down, up and down, elimination and replacement is sometimes inevitable.

5th, think of yourself as a cloud supplier, trying to consider problems from a supplier perspective. While most businesses start by treating themselves as cloud consumers, don't forget that business is also a service provider – because businesses also provide services to his internal and external customers and partners. Thinking about yourself as a cloud supplier can help companies better understand cloud computing providers.

6th, strengthen and attach great importance to familiar, use web security standards. The web security industry has long been committed to research on the protection and management of cross-domain systems, thus creating a number of useful security standards to ensure the security of cloud services. Only by applying these standards can the security system be used effectively in the cloud world.

7th, cloud Security is not only a technical problem, but also a legal and social problem. Pay close attention to relevant technology and standards, legal provisions of the progress and changes, as far as possible to avoid security risks is the basic principle. There is a general belief that cloud providers and companies need to share the responsibility for cloud computing, and the division of responsibility between the two is now a bit blurry. The responsibility split line is directly dependent on the pattern of cloud computing, ranging from software to services (SaaS) to platform Services (PaaS), to infrastructure as a service (IaaS). The SaaS approach is more like a secure black box, and application security is invisible to the enterprise. And IaaS, companies assume the primary responsibility for the security of applications, data, and other infrastructure. The discussion around cloud security focuses on the security measures that cloud providers should do, after all, data and application services are managed by cloud providers. But businesses need to keep in mind that companies are responsible for most of the cloud's security, and in some cases they are even the most responsible. Enterprises must not forget that if there is a safety leakage accident, the enterprise will be directly affected, after all, they are data owners. We should also note that cloud computing needs to be more pragmatic. In the eyes of many ordinary users who are concerned with the development of IT industry and technology, cloud computing is the hottest, most attractive it technology or application model after virtualization, and everyone can get excited by the "cloud-end" interaction, the wonderful picture of computing resources on demand.

However, the cloud of this fire is a little bit "virtual", virtual to still have a considerable number of enterprise users of its attitude is still only shouting chant and not to contribute, only talk about the concept of not landing. The reason is because there are quite a lot of difficulties in the concept of a cloud computing, the selection is difficult, the deployment is difficult, the application is also difficult. As long as there is any part of the problem, or not to consider, the so-called "let the calculation like tap water as the opening of the faucet there, but also free to assign" the ultimate goal of cloud computing can only stay in the desire phase.

The real rapid development and popularization of cloud computing is realized after the whole IT industry and enterprise users form a collaborative system. Today, the same choices are being made in the face of IT vendors and corporate users who are interested in promoting the spread of cloud computing.

We have to remember that without openness there is no future for cloud computing. After years of exploring the practice of cloud computing, the industry has come to a common understanding that only openness can lead to the rapid development and popularization of cloud computing. This view also contains two layers of the corresponding meaning. The first tier looks at the technical level, where products and solutions based on open architecture have an inherent advantage in breaking the compatibility, interoperability, unified management, and application and data migration challenges of devices in a cloud computing environment. Adhering to the open road and continuing to choose products based on open architecture is likely to be a key step towards a smooth transition of enterprise users to the cloud computing environment. In fact, the more successful public cloud services around the world are basically built on open architecture. Another industry-level implication is that, in sync with the development and application of open architecture based products and solutions, all it vendors and users involved in cloud computing should build an open, mutually beneficial ecosystem of cloud computing. Cloud computing involves too many areas, and many problems are intertwined. No matter who wants to go solo, I am afraid it is difficult to branch alone, and open ecosystems with good interaction mechanism, it can be a good solution to many of the problems of ring-ring phase.

Conclusion

At present, China's cloud computing industry is still in the import and preparation stage, on the eve of large-scale outbreak. Cloud computing industry has a great industry-driven forces, in the cloud driven by the new industry and new business model will emerge, a variety of integrated innovation will continue to emerge, so as to promote China's overall IT industry output value of a large increase. We look forward to this new wave of innovation in 2012 or 2013 years can really come! We have to be ready, do fight waves of the Petrel, let the wave of cloud computing come violent!

(Responsible editor: The good of the Legacy)

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.