6 Ways Cloud Computing Will Evolve In 2012 - InformationWeek
Cloud // Infrastructure as a Service
09:18 AM
Charles Babcock
Charles Babcock
Connect Directly

6 Ways Cloud Computing Will Evolve In 2012

Cloud computing will dig even deeper into the enterprise, with hybrid clouds, virtualized clients, and security standards topping the hot trends.

3. Finally, The Virtualized Client
Bigger than development, however, is the head of steam building up behind virtualized clients. So far, the success story has been virtualized servers, with the unwashed masses of confused clients lagging far behind. In 2012, that's about to change. Didn't we say that last year? This time, it's real. Big advances are being made in keeping virtualized clients secure, in some cases, lead by Citrix Systems. If virtual desktops are more secure than physical ones, then a major cost justification for the move materializes. A virtual user interface that can move from device to device resolves some of the conflicts preventing the transition to bring-your-own-computer to work. Look for a major ATM supplier, Diebold, to describe how it's using virtual end-user transactions to secure its ATM networks. Personal data can't be stolen (the way it was at supermarkets) if it's not resident on the endpoint transaction machine. If it works on ATMs, it may work on your end-user clients.

4. Cloud Security ... In Depth
In a conversation, Capgemini CTO Joe Coyle made an interesting prediction: "An accepted security model will come to the cloud in 2012." Amazon started 2011 with a new PCI compliance rating that said secure credit card transactions could be executed in EC2. During the year, cloud provider Terremark's NAP of the Americas data center in Miami, Fla., passed the Department of Defense's Information Assurance Certification and Accreditation Process, while Harris implemented its Cyber Integration Center for healthcare data processing, with market-leading defenses in depth. Security can be achieved in the cloud as well as the enterprise data center. "It's a matter of both the clients and the vendors understanding who has responsibility for which pieces," said Coyle. And in 2012, a blueprint for how that's achieved will be laid out.

5. Green Eye Shades Or Shades Of Green?
Builders of new data centers, including Facebook, Google, Amazon, and Microsoft, boast about the new levels of energy efficiency that they've achieved. With melting ice caps, we are not far off from when individual electricity consumption will be monitored with the same intense scrutiny as home consumption, and energy-efficient clouds will appeal to both IT and consumers. Not all applications need 300-watt, high-capacity, and high-speed servers behind them. In some cases, 15 or 20 watts will do. The intense use of mobile devices could in many instances be served by leading edge, energy efficient data centers, perhaps populated with servers like the ones HP announced using Calxeda's ARM chip. Maybe the Cortex chip servers, using 89% less power than conventional ones, wouldn't be the best platform for streaming video of the ballgame you want to see. But they'd be fine for the occasional burst of data telling you what the score is. And they'd keep you out of the red zone of too much energy consumption.

6. Going Over To The Dark Side
In 2012, we will see the first incident where a hacker gets inside a public cloud and produces mischief and mayhem. He will seem to understand its infrastructure, its protective measures and for a time will defy expulsion. CIO Jerry Johnson's account of how a hacker (unidentified but possibly a Chinese intruder) got into Pacific Northwest National Lab is too compelling a story to allow me to believe the public cloud has better defenses than it did. At this stage of cloud computing, too many doors are constantly opening and closing to the public cloud for defenses to cover all eventualities. Defense in depth is needed and is coming, but is not quite sufficiently in place to prevent an incident.

Charles Babcock is an editor-at-large for InformationWeek.

In this Cloud Connect webcast, learn how an automated, secure service in the cloud can remove the burden of managing the complex and error-prone data protection process. It happens Jan. 17.

2 of 2
Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of the Cloud Report
As the use of public cloud becomes a given, IT leaders must navigate the transition and advocate for management tools or architectures that allow them to realize the benefits they seek. Download this report to explore the issues and how to best leverage the cloud moving forward.
Twitter Feed
InformationWeek Radio
Archived InformationWeek Radio
Join us for a roundup of the top stories on InformationWeek.com for the week of November 6, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll