Difference between revisions of "Cloud computing"
Shawndouglas (talk | contribs) (→Security: Temporarily pasting security text in from another part of the article.) |
Shawndouglas (talk | contribs) (Revised content) |
||
Line 40: | Line 40: | ||
===Deployment models=== | ===Deployment models=== | ||
[[File:Cloud_computing_types.svg|thumb|325px|right|Cloud computing deployment types]] | |||
The NIST definition identifies four deployment models for cloud computing.<ref name="NISTCloudDef" /> | The NIST definition identifies four deployment models for cloud computing.<ref name="NISTCloudDef" /> | ||
Line 51: | Line 52: | ||
A fifth deployment option (potentially classifiable as "hybrid") that has become more notable is [[carrier cloud]], cloud computing services integrated into a communications service provider's network infrastructure.<ref name="KontronWP">{{cite web |url=http://www.kontron.com/resources/collateral/white_papers/kontroncarriercloudwp.pdf |format=PDF |title=Cloud Evolution: The Carrier Cloud |publisher=Kontron |date=2013 |accesssdate=20 August 2014}}</ref><ref name="NarcisiCC">{{cite web |url=http://searchtelecom.techtarget.com/feature/Carrier-cloud-services-Do-customers-care-if-you-own-the-network |title=Carrier cloud services: Do customers care if you own the network? |author=Narcisi, Gina |work=SearchTelecom |publisher=TechTarget |date=November 2013 |accessdate=20 August 2014}}</ref> | A fifth deployment option (potentially classifiable as "hybrid") that has become more notable is [[carrier cloud]], cloud computing services integrated into a communications service provider's network infrastructure.<ref name="KontronWP">{{cite web |url=http://www.kontron.com/resources/collateral/white_papers/kontroncarriercloudwp.pdf |format=PDF |title=Cloud Evolution: The Carrier Cloud |publisher=Kontron |date=2013 |accesssdate=20 August 2014}}</ref><ref name="NarcisiCC">{{cite web |url=http://searchtelecom.techtarget.com/feature/Carrier-cloud-services-Do-customers-care-if-you-own-the-network |title=Carrier cloud services: Do customers care if you own the network? |author=Narcisi, Gina |work=SearchTelecom |publisher=TechTarget |date=November 2013 |accessdate=20 August 2014}}</ref> | ||
==History== | ==History== | ||
The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network,<ref>{{ | The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network,<ref name="TAPI">{{cite web |url=http://www.sellsbrothers.com/writing/intro2tapi/default.aspx?content=pstn.htm |archiveurl=https://web.archive.org/web/20050502192319/http://www.sellsbrothers.com/writing/intro2tapi/default.aspx?content=pstn.htm |title=Windows Telephony Programming: A Developer's Guide to TAPI |author=Sells, Chris |work=Sellsbrothers.com |date=01 July 1998 |archivedate=02 May 2005 |accessdate=21 August 2014}}</ref> and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents.<ref name="ScanlonCloud">{{cite web |archiveurl=https://web.archive.org/web/20100211133442/http://www.thestandard.com/article/0,1902,5466,00.html |url=http://www.thestandard.com/article/0,1902,5466,00.html |title=The Internet Cloud |publisher=Thestandard.com |date= |accessdate=2010-08-22}}</ref> | ||
Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic, and utility computing. Details are abstracted from end-users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.<ref>{{Cite web|last=Danielson |first=Krissi |url=http://www.ebizq.net/blogs/saasweek/2008/03/distinguishing_cloud_computing/ |title=Distinguishing Cloud Computing from Utility Computing |publisher=Ebizq.net |date=2008-03-26 |accessdate=2010-08-22}}</ref> | Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic, and utility computing. Details are abstracted from end-users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.<ref>{{Cite web|last=Danielson |first=Krissi |url=http://www.ebizq.net/blogs/saasweek/2008/03/distinguishing_cloud_computing/ |title=Distinguishing Cloud Computing from Utility Computing |publisher=Ebizq.net |date=2008-03-26 |accessdate=2010-08-22}}</ref> |
Revision as of 14:57, 21 August 2014
Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility (like the electricity grid) over a network, typically the Internet.
Cloud computing describes a new supplement, consumption, and delivery model for IT services based on Internet protocols, and it typically involves provisioning of dynamically scalable and often virtualized resources[1][2]
Cloud computing typically takes the form of web-based tools or applications that users can access and use through a web browser as if they were programs installed locally on their own computers. Those applications and resulting data are stored on servers at a remote location. In some cases, legacy applications (line of business applications that until now have been prevalent in thin client Windows computing) are delivered via a screen-sharing technology, while the computing resources are consolidated at a remote data center location; in other cases, entire business applications have been coded using web-based technologies such as Ajax.
Overview
Characteristics
The National Institute of Standards and Technology (NIST) offers an authoritative definition of cloud computing. That definition encompasses the essential characteristics, service models, and deployment models of the service. Of the essential characteristics, cloud computing must[3]:
- provide computing capabilities and services on an as-needed basis, without human intervention;
- be broadly accessible from a wide variety of standard desktop and mobile platforms;
- make storage, processing, memory, and network bandwidth available as pooled, multi-tenant resources;
- make those resources scalable with demand, often automatically, at any time; and
- meter those resources and make the resulting information transparently available to both provider and consumer.
Additional, more granular characteristics of cloud computing include the following.
- An application programming interface (API) enables machines to interact with cloud software in the same way the user interface facilitates interaction between humans and computers. Cloud computing systems typically use REST-based APIs.
- Cost is potentially reduced in a public cloud delivery model, with capital expenditure being converted to operational expenditure, including research, development, and sales.[4] This is purported to lower barriers to entry, as infrastructure is typically provided by a third-party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained with usage-based options and fewer in-house IT skills are required for implementation.[5]
- Device and location independence enable users to access systems using a web browser regardless of their location or what device they are using (e.g., PC, mobile phone).[6] As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.[5]
- Multi-tenancy enables sharing of resources and costs across a large pool of users, allowing for centralization of infrastructure in locations with lower costs, peak-load capacity increases, and utilization and efficiency improvements.
- Reliability is improved if multiple redundant sites are used, which makes well-designed cloud computing suitable for business continuity and disaster recovery.[7]
- Services are scalable and elastic via dynamic, "on-demand" provisioning of resources on a fine-grained, self-service basis in real-time, without users having to engineer for peak loads.[8]
- Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.[5]
- Security could improve due to centralization of data, increased security-focused resources, etc., but concerns may persist about loss of control over certain sensitive data and the lack of security for stored kernels.
- Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer. They are easier to support and to improve, as the changes reach the clients instantly.
Service models
The NIST definition also details the service models, which include software as a service (SaaS; provider's application runs on their infrastructure), platform as a service (PaaS; consumer-created or -acquired application runs on provider's infrastructure), and infrastructure as a service (IaaS; customer deploys operating systems and applications over fundamental computing resources provisioned by the provider).[3]
Deployment models
The NIST definition identifies four deployment models for cloud computing.[3]
Private cloud: an infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally
Community cloud: an infrastructure shared between several organisations from a specific community with common concerns (security, compliance, jurisdiction, etc.), managed internally or by a third-party and hosted internally or externally
Public cloud: an infrastructure where resources are dynamically provisioned to the general public on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a metered basis
Hybrid cloud: a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models
A fifth deployment option (potentially classifiable as "hybrid") that has become more notable is carrier cloud, cloud computing services integrated into a communications service provider's network infrastructure.[9][10]
History
The term "cloud" is used as a metaphor for the Internet, based on the cloud drawing used in the past to represent the telephone network,[11] and later to depict the Internet in computer network diagrams as an abstraction of the underlying infrastructure it represents.[12]
Cloud computing is a natural evolution of the widespread adoption of virtualization, service-oriented architecture, autonomic, and utility computing. Details are abstracted from end-users, who no longer have need for expertise in, or control over, the technology infrastructure "in the cloud" that supports them.[13]
The underlying concept of cloud computing dates back to the 1960s, when John McCarthy opined that "computation may someday be organized as a public utility." Almost all the modern-day characteristics of cloud computing (elastic provision, provided as a utility, online, illusion of infinite supply), the comparison to the electricity industry and the use of public, private, government, and community forms, were thoroughly explored in Douglas Parkhill's 1966 book, The Challenge of the Computer Utility.
The actual term "cloud" borrows from telephony in that telecommunications companies, who until the 1990s offered primarily dedicated point-to-point data circuits, began offering Virtual Private Network (VPN) services with comparable quality of service but at a much lower cost. By switching traffic to balance utilization as they saw fit, they were able to utilize their overall network bandwidth more effectively. The cloud symbol was used to denote the demarcation point between that which was the responsibility of the provider and that which was the responsibility of the user. Cloud computing extends this boundary to cover servers as well as the network infrastructure.[14]
After the dot-com bubble, Amazon played a key role in the development of cloud computing by modernizing their data centers, which, like most computer networks, were using as little as 10% of their capacity at any one time, just to leave room for occasional spikes. Having found that the new cloud architecture resulted in significant internal efficiency improvements whereby small, fast-moving "two-pizza teams" could add new features faster and more easily, Amazon initiated a new product development effort to provide cloud computing to external customers, and launched Amazon Web Service (AWS) on a utility computing basis in 2006.[15][16]
In early 2008, Eucalyptus became the first open-source, AWS API-compatible platform for deploying private clouds. In early 2008, OpenNebula, enhanced in the RESERVOIR European Commission-funded project, became the first open-source software for deploying private and hybrid clouds, and for the federation of clouds.[17] In the same year, efforts were focused on providing QoS guarantees (as required by real-time interactive applications) to cloud-based infrastructures, in the framework of the IRMOS European Commission-funded project.[18] By mid-2008, Gartner saw an opportunity for cloud computing "to shape the relationship among consumers of IT services, those who use IT services and those who sell them"[19] and observed that "organisations are switching from company-owned hardware and software assets to per-use service-based models" so that the "projected shift to cloud computing ... will result in dramatic growth in IT products in some areas and significant reductions in other areas."[20]
Issues
Privacy
The cloud model has been criticized by privacy advocates for the greater ease in which the companies hosting the cloud services control, and, thus, can monitor at will, lawfully or unlawfully, the communication and data stored between the user and the host company. Instances such as the secret NSA program, working with AT&T, and Verizon, which recorded over 10 million phone calls between American citizens, causes uncertainty among privacy advocates, and the greater powers it gives to telecommunication companies to monitor user activity.[21] While there have been efforts (such as US-EU Safe Harbor) to "harmonize" the legal environment, providers such as Amazon still cater to major markets (typically the United States and the European Union) by deploying local infrastructure and allowing customers to select "availability zones."[22]
Compliance
In order to obtain compliance with regulations including FISMA, HIPAA, and SOX in the United States, the Data Protection Directive in the EU and the credit card industry's PCI DSS, users may have to adopt community or hybrid deployment modes that are typically more expensive and may offer restricted benefits. This is how Google is able to "manage and meet additional government policy requirements beyond FISMA"[23][24] and Rackspace Cloud are able to claim PCI compliance.[25]
Many providers also obtain SAS 70 Type II certification, but this has been criticized on the grounds that the hand-picked set of goals and standards determined by the auditor and the auditee are often not disclosed and can vary widely.[26] Providers typically make this information available on request, under non-disclosure agreement.[27]
Customers in the EU contracting with cloud providers established outside the EU/EEA have to adhere to the EU regulations on export of personal data.[28]
Performance
With the American average download speed at 4MiB/S cloud computing relies on a high speed infrastructure that does not exist. This makes cloud computing impractical in many environments, in fact many local networks would struggle to serve multiple cloud instances. Depending on the setup cloud computing can require very fast internet, less CPU intensive setups (for the client) simply stream video over the internet or a LAN.[citation needed]
Criticism
Some have come to criticize the term as being either too unspecific or even misleading. CEO Larry Ellison of Oracle Corporation asserts that cloud computing is "everything that we already do", claiming that the company could simply "change the wording on some of our ads" to deploy their cloud-based services.[29][30][31][32][33] Forrester Research VP Frank Gillett questions the very nature of and motivation behind the push for cloud computing, describing what he calls "cloud washing"—companies simply relabeling their products as "cloud computing", resulting in mere marketing innovation instead of "real" innovation.[34][35]
GNU's Richard Stallman insists that the industry will only use the model to deliver services at ever increasing rates over proprietary systems, otherwise likening it to a "marketing hype campaign".[36]
Legal
In March 2007, Dell applied to trademark the term "cloud computing" (U.S. Trademark 77,139,082) in the United States. The "Notice of Allowance" the company received in July 2008 was canceled in August, resulting in a formal rejection of the trademark application less than a week later. Since 2007, the number of trademark filings covering cloud computing brands, goods, and services has increased rapidly. As companies sought to better position themselves for cloud computing branding and marketing efforts, cloud computing trademark filings increased by 483% between 2008 and 2009. In 2009, 116 cloud computing trademarks were filed, and trademark analysts predict that over 500 such marks could be filed during 2010.[37]
Other legal cases may shape the use of cloud computing by the public sector. On October 29, 2010, Google filed a lawsuit against the U.S. Department of Interior, which opened up a bid for software that required that bidders use Microsoft's Business Productivity Online Suite. Google sued, calling the requirement "unduly restrictive of competition."[38] Scholars have pointed out that, beginning in 2005, the prevalence of open standards and open source may have an impact on the way that public entities choose to select vendors.[39]
There are also concerns about a cloud provider shutting down for financial or legal reasons, which has happened in a number of cases.[40]
Open source
Open source software has provided the foundation for many cloud computing implementations, one prominent example being the Hadoop framework.[41] In November 2007, the Free Software Foundation released the Affero General Public License, a version of GPLv3 intended to close a perceived legal loophole associated with free software designed to be run over a network.[42]
Open standards
Most cloud providers expose APIs that are typically well-documented (often under a Creative Commons license[43]) but also unique to their implementation and thus not interoperable. Some vendors have adopted others' APIs and there are a number of open standards under development, with a view to delivering interoperability and portability.[44]
Security
As cloud computing is achieving increased popularity, concerns are being voiced about the security issues introduced through the adoption of this new model. The effectiveness and efficiency of traditional protection mechanisms are being reconsidered as the characteristics of this innovative deployment model differ widely from those of traditional architectures.[45]
The relative security of cloud computing services is a contentious issue that may be delaying its adoption.[46] Issues barring the adoption of cloud computing are due in large part to the private and public sectors unease surrounding the external management of security based services. It is the very nature of cloud computing based services, private or public, that promote external management of provided services. This delivers great incentive among cloud computing service providers in producing a priority in building and maintaining strong management of secure services.[47] Security issues have been categorized into sensitive data access, data segregation, privacy, bug exploitation, recovery, accountability, malicious insiders, management console security, account control, and multi-tenancy issues. Solution to various cloud security issues vary through cryptography, particularly public key infrastructure (PKI), use of multiple cloud providers, standardization of APIs, improving virtual machine support and legal support.[45][48][49]
Security is often as good as or better than under traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford.[50] However, the complexity of security is greatly increased when data is distributed over a wider area or greater number of devices and in multi-tenant systems that are being shared by unrelated users. In addition, user access to security audit logs may be difficult or impossible. Private cloud installations are in part motivated by users' desire to retain control over the infrastructure and avoid losing control of information security.
Sustainability
Although cloud computing is often assumed to be a form of "green computing", there is as of yet no published study to substantiate this assumption.[51] Siting the servers affects the environmental effects of cloud computing. In areas where climate favors natural cooling and renewable electricity is readily available, the environmental effects will be more moderate. Thus countries with favorable conditions, such as Finland,[52] Sweden and Switzerland,[53] are trying to attract cloud computing data centers.
Abuse
As with privately purchased hardware, crackers posing as legitimate customers can purchase the services of cloud computing for nefarious purposes. This includes password cracking and as a means of launching attacks.[54] In 2009, a banking trojan illegally used the popular Amazon service as a command and control channel that issued software updates and malicious instructions to PCs that were infected by the malware.[55]
Cloud Computing Contracts
Most transitions to a cloud computing solution entail a change from a technically managed solution to a contractually managed solution. This change necessitates increased IT contract negotiation skills to establish the terms of the relationship and vendor management skills to maintain the relationship. All rights and responsibilities that are associated with the relationship between a client and a cloud computing services provider must be codified in the contract and effectively managed until the relationship has been terminated. Key risks and issues that are either unique to cloud computing or essential to its effective adoption typically involve service level agreements; data processing and access; provider infrastructure and security; and contract and vendor management.[56]
Notes
This article heavily reuses content from the Wikipedia article.
References
- ↑ "Gartner Says Cloud Computing Will Be As Influential As E-business". Gartner, Inc. 26 June 2008. http://www.gartner.com/newsroom/id/707508. Retrieved 20 August 2014.
- ↑ Knorr, Eric; Gruman, Galen (7 April 2008). "What cloud computing really means". InfoWorld. IDG Network. http://www.infoworld.com/d/cloud-computing/what-cloud-computing-really-means-031. Retrieved 20 August 2014.
- ↑ 3.0 3.1 3.2 Mell, Peter; Grance, Timothy (September 2011). "The NIST Definition of Cloud Computing" (PDF). National Institute of Standards and Technology. http://csrc.nist.gov/publications/nistpubs/800-145/SP800-145.pdf. Retrieved 20 August 2014.
- ↑ Columbus, Louis (10 April 2013). "Making Cloud Computing Pay". Forbes. http://www.forbes.com/sites/louiscolumbus/2013/04/10/making-cloud-computing-pay-2/. Retrieved 20 August 2014.
- ↑ 5.0 5.1 5.2 Gens, Frank (23 September 2008). "Defining "Cloud Services" and "Cloud Computing"". IDC. http://blogs.idc.com/ie/?p=190. Retrieved 20 August 2014.
- ↑ Farber, Dan (25 June 2008). "The new geek chic: Data centers". CNET. CBS Interactive. http://www.cnet.com/news/the-new-geek-chic-data-centers/. Retrieved 20 August 2014.
- ↑ King, Rachael (4 August 2008). "Cloud Computing: Small Companies Take Flight". Businessweek. http://www.businessweek.com/technology/content/aug2008/tc2008083_619516.htm. Retrieved 20 August 2014.
- ↑ Kuperberg, Michael; Herbst, Nikolas; Kistowski, Joakim von; Reussner, Ralf (2011). "Defining and Measurng Cloud Elasticity". Karlsruher Institut für Technologie. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000023476. Retrieved 20 August 2014.
- ↑ "Cloud Evolution: The Carrier Cloud" (PDF). Kontron. 2013. http://www.kontron.com/resources/collateral/white_papers/kontroncarriercloudwp.pdf.
- ↑ Narcisi, Gina (November 2013). "Carrier cloud services: Do customers care if you own the network?". SearchTelecom. TechTarget. http://searchtelecom.techtarget.com/feature/Carrier-cloud-services-Do-customers-care-if-you-own-the-network. Retrieved 20 August 2014.
- ↑ Sells, Chris (1 July 1998). "Windows Telephony Programming: A Developer's Guide to TAPI". Sellsbrothers.com. Archived from the original on 02 May 2005. https://web.archive.org/web/20050502192319/http://www.sellsbrothers.com/writing/intro2tapi/default.aspx?content=pstn.htm. Retrieved 21 August 2014.
- ↑ "The Internet Cloud". Thestandard.com. Archived from the original. Error: If you specify
|archiveurl=
, you must also specify|archivedate=
. https://web.archive.org/web/20100211133442/http://www.thestandard.com/article/0,1902,5466,00.html. Retrieved 2010-08-22. - ↑ Danielson, Krissi (26 March 2008). "Distinguishing Cloud Computing from Utility Computing". Ebizq.net. http://www.ebizq.net/blogs/saasweek/2008/03/distinguishing_cloud_computing/. Retrieved 2010-08-22.
- ↑ "July, 1993 meeting report from the IP over ATM working group of the IETF". http://mirror.switch.ch/ftp/doc/ietf/ipatm/atm-minutes-93jul.txt. Retrieved 2010-08-22.
- ↑ Jeff Bezos' Risky Bet.
- ↑ [1].
- ↑ B. Rochwerger, J. Caceres, R.S. Montero, D. Breitgand, E. Elmroth, A. Galis, E. Levy, I.M. Llorente, K. Nagin, Y. Wolfsthal, E. Elmroth, J. Caceres, M. Ben-Yehuda, W. Emmerich, F. Galan. "The RESERVOIR Model and Architecture for Open Federated Cloud Computing", IBM Journal of Research and Development, Vol. 53, No. 4. (2009)
- ↑ D. Kyriazis, A. Menychtas, G. Kousiouris, K. Oberle, T. Voith, M. Boniface, E. Oliveros, T. Cucinotta, S. Berger, “A Real-time Service Oriented Infrastructure”, International Conference on Real-Time and Embedded Systems (RTES 2010), Singapore, November 2010
- ↑ Keep an eye on cloud computing, Amy Schurr, Network World, 2008-07-08, citing the Gartner report, "Cloud Computing Confusion Leads to Opportunity". Retrieved 2009-09-11.
- ↑ Gartner Says Worldwide IT Spending On Pace to Surpass Trillion in 2008, Gartner, 2008-08-18. Retrieved 2009-09-11.
- ↑ Cauley, Leslie (2006-05-11). "NSA has massive database of Americans' phone calls". USATODAY.com. http://www.usatoday.com/news/washington/2006-05-10-nsa_x.htm. Retrieved 2010-08-22.
- ↑ "Feature Guide: Amazon EC2 Availability Zones". Amazon Web Services. http://developer.amazonwebservices.com/connect/entry.jspa?externalID=1347&categoryID=112. Retrieved 2010-08-22.
- ↑ "FISMA compliance for federal cloud computing on the horizon in 2010". SearchCompliance.com. http://searchcompliance.techtarget.com/news/article/0,289142,sid195_gci1377298,00.html. Retrieved 2010-08-22.
- ↑ "Google Apps and Government". Official Google Enterprise Blog. 15 September 2009. http://googleenterprise.blogspot.com/2009/09/google-apps-and-government.html. Retrieved 2010-08-22.
- ↑ "Cloud Hosting is Secure for Take-off: Mosso Enables The Spreadsheet Store, an Online Merchant, to become PCI Compliant". Rackspace. 14 March 2009. http://www.rackspace.com/cloud/blog/2009/03/05/cloud-hosting-is-secure-for-take-off-mosso-enables-the-spreadsheet-store-an-online-merchant-to-become-pci-compliant/. Retrieved 2010-08-22.
- ↑ "Amazon gets SAS 70 Type II audit stamp, but analysts not satisfied". SearchCloudComputing.com. 17 November 2009. http://searchcloudcomputing.techtarget.com/news/article/0,289142,sid201_gci1374629,00.html. Retrieved 2010-08-22.
- ↑ "Assessing Cloud Computing Agreements and Controls". WTN News. http://wistechnology.com/articles/6954/. Retrieved 2010-08-22.
- ↑ "How the New EU Rules on Data Export Affect Companies in and Outside the EU | Dr. Thomas Helbing – Kanzlei für Datenschutz-, Online- und IT-Recht". Dr. Thomas Helbing. http://www.thomashelbing.com/en/how-new-eu-rules-data-export-affect-companies-and-outside-eu. Retrieved 2010-08-22.
- ↑ “”. "Larry Ellison – What The Hell Is Cloud Computing?". YouTube. http://www.youtube.com/watch?v=0FacYAI6DY0. Retrieved 2010-08-22.
- ↑ Farber, Dan (26 September 2008). "Oracle's Ellison nails cloud computing". CNET News. http://news.cnet.com/8301-13953_3-10052188-80.html. Retrieved 2010-08-22.
- ↑ "Oracle launches worldwide cloud-computing tour". Computerworld. 10 February 2010. http://www.computerworld.com.au/article/335674/oracle_launches_worldwide_cloud-computing_tour/. Retrieved 2010-08-22.
- ↑ By James Rogers (18 December 2009). "Oracle's Ellison Issues Cloud Challenge". Thestreet.com. http://www.thestreet.com/story/10649557/1/oracles-ellison-issues-cloud-challenge.html. Retrieved 2010-08-22.
- ↑ "Oracle desperately seeking cloud cred". Searchcloudcomputing.techtarget.com. 16 February 2010. http://searchcloudcomputing.techtarget.com/news/article/0,289142,sid201_gci1384202,00.html. Retrieved 2010-08-22.
- ↑ “” (29 September 2008). "Cloud Computing is Hyped and Overblown". Youtube.com. http://www.youtube.com/watch?v=f7wv1i8ubng. Retrieved 2010-08-22.
- ↑ "Cloud Computing is Hyped and Overblown, Forrester's Frank Gillett Big Tech Companies Have "Cloud Envy"". Beet.tv. http://www.beet.tv/2008/09/cloud-computing.html. Retrieved 2010-08-22.
- ↑ Cloud computing is a trap, warns GNU founder Richard Stallman, The Guardian, par Bobbie Johnson, 29 septembre 2008
- ↑ "Inside Trademarks March 24, 2010". Insidetrademarks.com. 24 March 2010. http://insidetrademarks.com/2010/03/24/cloud-computing-trademark-trends/. Retrieved 2010-08-22.
- ↑ Google, Inc. vs. the United States
- ↑ Casson and Ryan, Open Standards, Open Source Adoption in the Public Sector, and Their Relationship to Microsoft’s Market Dominance
- ↑ Scheier, Robert L. (20 April 2009). "What to do if your cloud provider disappears | Cloud Computing". InfoWorld. http://www.infoworld.com/d/cloud-computing/what-do-if-your-cloud-provider-disappears-508. Retrieved 2010-08-22.
- ↑ "Open source fuels growth of cloud computing, software-as-a-service". Network World. http://www.networkworld.com/news/2008/072808-open-source-cloud-computing.html. Retrieved 2010-08-22.
- ↑ "AGPL: Open Source Licensing in a Networked Age". Redmonk.com. 15 April 2009. http://redmonk.com/sogrady/2009/04/15/open-source-licensing-in-a-networked-age/. Retrieved 2010-08-22.
- ↑ GoGrid Moves API Specification to Creative Commons[dead link]
- ↑ "Eucalyptus Completes Amazon Web Services Specs with Latest Release". Ostatic.com. http://ostatic.com/blog/eucalyptus-completes-amazon-web-services-specs-with-latest-release. Retrieved 2010-08-22.
- ↑ 45.0 45.1 Zissis, Dimitrios; Lekkas (2010). "Addressing cloud computing security issues". Future Generation Computer Systems. doi:10.1016/j.future.2010.12.006. http://www.sciencedirect.com/science/article/pii/S0167739X10002554.
- ↑ "Are security issues delaying adoption of cloud computing?". Network World. http://www.networkworld.com/news/2009/042709-burning-security-cloud-computing.html. Retrieved 2010-08-22.
- ↑ "Security of virtualization, cloud computing divides IT and security pros". Network World. 22 February 2010. http://www.networkworld.com/news/2010/022210-virtualization-cloud-security-debate.html. Retrieved 2010-08-22.
- ↑ Armbrust, M; Fox, A., Griffith, R., Joseph, A., Katz, R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A., Zaharia, (2010). "A view of cloud computing.". Communication of the ACM 53 (4): 50–58. doi:10.1145/1721654.1721672.
- ↑ Anthens, G. "Security in the cloud". Communications of the ACM 53 (11). doi:10.1145/1839676.1839683.
- ↑ Mills, Elinor (27 January 2009). "Cloud computing security forecast: Clear skies". CNET News. http://news.cnet.com/8301-1009_3-10150569-83.html. Retrieved 2010-08-22.
- ↑ James Urquhart (January 7, 2010). "Cloud computing's green paradox". CNET News. http://news.cnet.com/8301-19413_3-10428065-240.html. Retrieved March 12, 2010. "...there is some significant evidence that the cloud is encouraging more compute consumption"
- ↑ Finland – First Choice for Siting Your Cloud Computing Data Center.. Retrieved 4 August 2010.
- ↑ Swiss Carbon-Neutral Servers Hit the Cloud.. Retrieved 4 August 2010.
- ↑ http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-have-been-invaded-by-hackers-using-amazon-com-server.html
- ↑ http://www.theregister.co.uk/2011/05/14/playstation_network_attack_from_amazon/
- ↑ http://www.educause.edu/EDUCAUSE+Quarterly/EDUCAUSEQuarterlyMagazineVolum/IfItsintheCloudGetItonPaperClo/206532