The cloud is becoming a broad concept with different applications

Source: Internet
Author: User
Keywords Come into being be different appear gradually become
Tags allowing application application developers application development applications asset based cloud

When we test cloud services, or observe various cloud behaviors, we notice that the process of enterprise adoption of cloud computing can be broadly divided into several different phases.

First, application developers are keen on cloud-based, disposable infrastructure and/or out-of-the-way application development platforms that avoid the lengthy equipment purchase cycle and investment budget constraints. Other attractive areas of cloud computing include the commercialization of leased infrastructure, or the readily scalable platform. Sometimes, various enterprise applications can be extended to the cloud as private growth areas, or they can all migrate to the public cloud.

The cloud hosting service has sprung up in 2012 to meet these needs. However, security and reliability/sla aspects of the problem must be resolved, only in this way, the application of Yu Yun and enterprise internal resource/Asset Management application improvements, as well as new cloud-based services will continue to emerge.

With the advent of standardized IaaS and PAAs services, a variety of value-added services, especially those around management, behavioral security, and migration, will grow.

We have tested many products that perform security monitoring in different ways, including personal identity management, common one-click login Management, and a large number of application products for cloud monitoring and internal resources. We expect a significant increase in these categories of products. and increased intelligent security monitoring, such as the system log management capabilities of products, as well as asset monitoring products will also increase in number.

Asset monitoring has become increasingly difficult because of the increasing number of different kinds of mobile assets, especially smartphones and tablets. We have reviewed several mobile device management (MDM) applications and found that the convenience of cloud monitoring seems to be starting to go beyond internal asset tracking and policy class applications.

We believe that cloud-based MDM applications will grow rapidly and users will interact more directly with the various MDM applications, and the variety of application stores or application resources recognized by the enterprise will grow. The reason for this growth is that businesses need to review the security and confidentiality of applications used on smartphones and tablets, and that the cost of purchasing mobile devices in bulk is lower.

Along the same lines, as MDM applications dominate the mobile asset market, their future development may extend to the control of fixed assets within the enterprise, such as desktops, servers, and peripherals. In other words, the leader of such applications currently running in the cloud will connect more assets to control and submit overall audit liability reports for compliance and regulatory control. This segment of the market will show explosive growth.

Similarly, we see a tendency to synthesize MDM and identity management in applications. Microsoft's Systemcenter is an example of how this trend is being met, even though it has not yet been listed.

Cloud hosting providers, managed cloud services enterprises, and so on, will gradually become agents of the cloud stack service, which enables rapid application development, easy application deployment, and the ability to collaborate with stack services with various industry initiative organizations such as OpenStack. There will also be an increase in the number of tools that leverage development frameworks and development platforms, which will be provided by the MSO/MSP agent to provide a more comprehensive solution.

This class producesThe product will include the desktop as a service (DaaS), in particular allowing the tablet to become a "full member" of the application deployment process. MSP and other hosting companies will provide a wide range of access to the Internet, using a variety of management methods to protect the use of the application. The goal of Daas is to use arbitrary devices to access various applications uniformly over the Internet. With the proliferation of malicious attacks such as dictionary attacks and peeping tools, the service of Daas, which uses smart cards and biometric authentication devices, will also grow.

The last area of growth for cloud services in the 2012 is likely to be cloud training, which produces certificate training for cloud deployments. The cloud is becoming a broad concept that has a wide variety of applications, becoming an enhanced data center or a completely different area from the data center.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.