Note From The Author, Gus
Thank you for visiting our site. I hope the information herein was useful to you. Should you have additional PC-related questions or problems, click for help: FREE Tech Support Request. Stop searching and get solutions!
For most of us, we are familiar with working on ‘personal computers’, whether it be a desktop PC, or laptop, regardless of the brand, or model. Cloud computing, on the other hand, is a service, rather than a product, similar to what businesses initially used…CRT’s and keyboards only, connected to centralized application and data centers.
Cloud computing has taken on so many definitions since it was first coined. One aspect of cloud computing early on, was to provide asynchronous sharing between all connected devices. It is also considered to provide the ability to serve shared data, services, and resources spread over inter-connected hardware components, controlled by specialty software, to dissimilar group of connected computers and devices, via the public Internet.
Imagine being able to share images, photo’s, and home movies instantly with friends and family, or share not only documents with co-workers, but the opportunity to connect and edit them live, remotely. These web-based applications become more and more powerful with every new application development, increase in Internet speed, and mobile performance.
Wikipedia says, ”Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and configuration of the system that delivers the services.”
Whether you know it or not, you’re already utilizing cloud-based services. A good analogy might be you turning on your TV in the morning. Your television set is powered by electricity that comes from a series of electrical transformers, or an ’electric power grid’. For you, it is NOT a matter of knowing specifically where the electricity comes from, or about the infrastructure, it’s just about knowing there will be electricity when you need it.
Other instances of our using cloud computing in our everyday life, might be how we communicate and shop online. Email from Gmail, documents saved to Google Docs, or shopping on Amazon.com, are prime examples of using cloud computing.
Per our article introduction, vendors and those in know, define cloud computing in so many ways. Though many are simply using variations as a form of marketing, we can all benefit from understanding the basic design of it.
Here are the general attributes of cloud computing…
Okay, but how can we take advantage of clout computing ourselves, today? Though there are other examples of personal cloud computing, Microsoft is leading the way in offering consumers the functionality of cloud computing, which has been utilized solely by businesses and Internet services previously.
Uniquely, Microsoft has integrated personal cloud computing functionality in many of their consumer product, such as Windows 7 operating system, Windows Live Messenger, SkyDrive, Office, and others.
According to Steven Guggenheimer, the corporate vice president of Microsoft’s OEM Division, “The personal cloud is a way to link several experiences together for end users.” and said, “Technology is converging, with devices using similar operating systems, networks and radio stacks, but as technology converges, devices tend to diverge. The next challenge, then, is to figure out how to get content to behave consistently across a range of very different devices.”
Though, as mentioned early on, business has been using some aspect of cloud computing, it is continuing to widen and become more flexible. Previously, businesses had to purchase bloated enterprise-level CRM (Customer Relationship Management) and ERP (Enterprise Resource Planning) software, and deploy it throughout all workstations.
Along the way, other vendors started offering customized application services without the need to purchase software suites. Companies have taken a precautionary trip through cloud computing, and we are finding more and more are electing to go with web-based software solutions.
In addition to traditional CRM solutions, companies are discovering more uses for cloud computing. In a nutshell, it has allowed travelers and telecommuters more powerful data mining functions. The easiest example of this might be syncing of out mobile devices with private networks…syncing smartphones with the likes of Microsoft Outlook, or Lotus Notes. Not to mention, social media companies such as Facebook and Twitter offering mobile apps.
Companies are also increasing its use of cloud computing for a competitive advantage, in terms of analytics. Thanks to this technology, a good overview on a specific topic can be put together almost instantaneously, by not only accessing all known data from company databases, but also from the Internet. Not to mention, they can scrap data from across many avenues of marketing to pear into the eyes of their end-consumer, or prospect base to understand what exactly are they searching for.
The future for cloud computing is going to be having access to your digital books, music collections, and all kinds documents, and being able to share your information across multiple clouds, both private and public. Have the ability to interact with others via social networks, access to banking info, etc.
The pace at which we will utilize more of these services depends all on how well providers can secure private information in a cloud environment. It is easy to share this data publicly, but far more difficult to secure data in cloud computing. In order for cloud computing to fully function, they will need to have privacy and security as the number one concern.
As you may imagine, the constant threat of viruses and spyware can also cause problems for cloud computing networks, specifically, keyloggers. These little gems can record the keystrokes of users, allowing hackers to steal access information. This is why there is some hesitancy among IT staff of companies. Before cloud computing becomes universal, service providers will need to beef up cloud computing infrastructure and provide better authentication techniques.