Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Cloud Computing and Outsourcing: Is Data Lost in the Fog?

Cloud computing is here.  And if it isn't at your company yet, it soon will be.  Cloud computing is simply the latest version of the historical use of technology to increase flexibility and reduce costs.  By providing a bundled and scalable solution of software, infrastructure, data storage and communication, cloud computing providers allow companies to reserve cash, avoid expensive IT commitments, efficiently scale usage based on need, and launch new services quickly.  However, there is truly no free lunch - at this point in its development, outsourced cloud computing fails to address important questions of legal risk associated with knowing where data is stored and transmitted.  This article discusses several of these issues, which must be considered by companies turning to third-party cloud computing solutions.

First, of course, we need to define what we are talking about, because there are many definitions of "cloud computing."  Recently, a CIO we know defined it as a computing utility of virtual servers that are controlled by an organization and accessible to end-users via the Internet.  We define cloud computing as the provision of business applications that are accessible via the Internet using software and data stored on virtual servers.  Cloud computing offers a commoditization of business technologies:  infrastructure as a service, software as a service, and platform as a service, all online and in a Web 2.0 framework.  When a third party controls any aspect of the "cloud," issues are created regarding data security, privacy and legal compliance.  In a way, this has been the case ever since fixed data lines were replaced by communication solutions that bundled data from several companies.  The third party tries to fully exploit the efficiencies of virtualization and commoditization of several traditionally proprietary functions (infrastructure, platform and software), but creates substantial legal risk at the same time.

The benefits of third party solutions to commercial applications are well established.  From third-party software solution providers who leveraged the requirements of multiple customers, to outsourced infrastructure providers who invest in faster and better technology solutions than is possible for any single customer, third parties have always been able to use efficiencies of scale and commoditization to drive down the costs of providing a function.  However, with these benefits come risks, some of which are highlighted below.

Data Storage and Transfer

In a conventional outsourcing arrangement, the customer can negotiate control over the location of its data, including where backup operations will be conducted.  This knowledge allows the customer and provider to know which regulatory schemes apply and to comply with the relevant data transfer laws.  Outsourced cloud computing, however, can be delivered at a cost-effective price because the provider can move data around the world, perhaps splitting it up and sending it to different locations, depending on capacity, use and bandwidth.  This freedom may result in non-compliance with the myriad worldwide regulations pertaining to storage and transfer of data.


Page:  1 | 234  | Next Page »


Related Reading


More Insights


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers