Hybrid Clouds Move to the Forefront

نویسنده

  • Neal Leavitt
چکیده

D espite cloud computing’s enormous popularity and high profile, many companies have been dissatisfied because they haven’t found what they want in a single cloud architecture. Private clouds, which organizations run internally, are secure, accessible without Internet availability, and customizable. Public clouds run over the Internet and are scalable, less costly, and simple to adopt and use. Until recently, organizations could not easily and economically integrate and operate both types of architectures as part of one overall cloud system. Now, though, companies are seamlessly merging private and public approaches, creating a hybrid cloud that lets them reap some of the benefits of each, noted Panos Tsirigotis, chief software architect and cofounder of hybridcloud vendor CloudVelocity. Hybrid cloud adoption will be easy for many organizations because they already have an in-house cloud and need only leverage existing public capabilities, explained University of Texas at Dallas associate professor Murat Kantarcioglu. The technology potentially represents a big business opportunity. In fact, market research firm IDC predicts hybrid cloud management tools will generate $3.6 billion in revenue worldwide by 2016. Corporations, service providers, governments, and independent software vendors are all looking to capitalize on this opportunity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Identity Providers-as-a-Service built as Cloud-of-Clouds: challenges and opportunities

In our previous work we designed and evaluated the feasibility of highly secure and dependable identity providers (IdPs) for the increasing requirements of future IT infrastructures. In this position paper we extend our previous work by analyzing and discussing the benefits of deploying highly secure and dependable identity providers-as-a-service (IdP-as-aService), without compromising the conf...

متن کامل

Performance evaluation of block-based copy- move image forgery detection algorithms

Copy-move forgery is a particular type of distortion where a part or portions of one image is/are copied to other parts of the same image. This type of manipulation is done to hide a particular part of the image or to copy one or more objects into the same image. There are several methods for detecting copy-move forgery, including block-based and key point-based methods. In this paper, a method...

متن کامل

Nano-bio Hybrid Material Based on Bacteriorhodopsin and ZnO for Bioelectronics Applications

Bioelectronics has attracted increasing interest in recent years because of their applications in various disciplines, such as biomedical. Development of efficient bio-nano hybrid materials is a new move towards revolution of nano-bioelectronics. A novel nano-bio hybrid electrode based on ZnO–protein for bioelectronics applications was prepared and characterized. The electrode was made by coval...

متن کامل

Nano-bio Hybrid Material Based on Bacteriorhodopsin and ZnO for Bioelectronics Applications

Bioelectronics has attracted increasing interest in recent years because of their applications in various disciplines, such as biomedical. Development of efficient bio-nano hybrid materials is a new move towards revolution of nano-bioelectronics. A novel nano-bio hybrid electrode based on ZnO–protein for bioelectronics applications was prepared and characterized. The electrode was made by coval...

متن کامل

3D Detection of Power-Transmission Lines in Point Clouds Using Random Forest Method

Inspection of power transmission lines using classic experts based methods suffers from disadvantages such as highel level of time and money consumption. Advent of UAVs and their application in aerial data gathering help to decrease the time and cost promenantly. The purpose of this research is to present an efficient automated method for inspection of power transmission lines based on point c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Computer

دوره 46  شماره 

صفحات  -

تاریخ انتشار 2013