SlideShare a Scribd company logo
1 of 10
Download to read offline
1
Cloud Computing:
The Hybrid Model
Legal Notice:
© 2014 Business.com Media, Inc. All Rights Reserved.
By reading this e-book, you agree to the following terms and conditions.
Under no circumstances should this e-book be sold, copied, or reproduced in any way
except when you have received written permission.
As with any business, your results may vary and will be based on your background,
dedication, desire, and motivation. Any testimonials and examples used are excep-
tional results, which do not apply to the average purchaser and are not intended to
represent or guarantee that anyone will achieve the same or similar results. You may
also experience unknown or unforeseeable risks which can reduce results. The au-
thors are not responsible for your actions.
The material contained in this report is strictly confidential.
Contents
Welclome	4
Main Types of Cloud Computing Services	 5
The Hybrid Cloud	 7
The Case for Private Cloud-Hosting	 9
4
Welcome
S
mall and medium-size businesses (SMBs), though initially slow to
adopt cloud computing, have been making up for lost time. From a
worldwide market of $16.2 billion in 2008, spending on cloud services
grew 250% in four years to $42.3 billion in 2012, according to IDC.
Many SMBs are realizing the advantages of cloud-hosted services. For example,
cloud computing usually costs less than the same capacity would cost onsite.
It’s also more readily available to your team, more secure, backed-up remotely,
reducing the cost of hiring IT talent, and eliminating the need to install or update
software. Cloud services are easy to scale, too; you can purchase only the
services and storage you need.
Just like any other technology, cloud computing is not devoid of areas of concern.
Data stored in the cloud is subject to unauthorized access, not only while it is
in the cloud, but also coming from and going to the cloud. There have been
some spectacular examples of crashes in cloud computing already; fixing those
problems is outside of your control. There are many unsettled questions as to
who may legally access data stored in the cloud. When cloud storage provider
Mega Upload was shut down for data piracy by government authorities in 2013, a
lot of legitimate users of that service lost access to their files.
5
Main Types of Cloud
Computing Services
Cloud computing is a broad term that includes three main categories of service:
1.	 Software-as-a-Service (SaaS). Applications are available over a network
-- typically the Internet -- often on a subscription basis. They’re hosted by
a service provider or a vendor. Examples include iCloud, iTunes, iWork,
Amazon Web Services, Dropbox, Evernote, Google Apps, Salesforce,
QuickBooks Online, etc.
2.	 Platform-as-a-Service (PaaS). The provider supplies the networks,
servers, storage, and other services, and the customer creates the
software using tools and libraries from the provider, along with custom
apps, databases, and other services -- all integrated into one platform.
Examples include AppScale, Google App Engine, and Windows Azure.
With Software-as-a-Service (SaaS) Applications are
available over a network -- typically the Internet -- often
on a subscription basis.
6
3.	 Infrastructure-as-a-Service (IaaS).The service provides servers,
hardware, firewalls, storage, and various networking components. Payment
is typically on per-user basis. The service provider owns the equipment,
maintains it, and operates it. Examples include Amazon EC2, Rackspace
OpenStack Cloud, HP Public Cloud, SoftLayer CloudLayer Computing.
With the option of using private, public, or hybrid cloud-hosting services, the
question is, which system should you choose?
With the option of using private, public, or hybrid
cloud-hosting services, the question is, which system
should you choose?
7
The Hybrid Cloud
I
ncreasingly, businesses are relying on hybrid cloud solutions to ease
dependency on third party services. Hybrid cloud hosting is well suited for
companies that need to protect sensitive data and proprietary information.
Hybrid combines the capabilities of an onsite cloud infrastructure with
benefits of remote systems administration.
The main advantages of hybrid cloud solutions are related to cost and on-
demand flexibility. Some companies use a hybrid cloud to expand onsite
capabilities and then only go to the cloud when there’s excess demand. That
way, the company only pays for extra capacity when needed. In a reverse hybrid,
companies can use the cloud for their everyday computing needs and tap in-
house resources to cover peak needs.
Some companies use a hybrid cloud to expand
onsite capabilities and then only go to the cloud
when there’s excess demand.
8
There are challenges with hybrid clouds. Implementing a seamless integration
of company resources with the service provider’s can be tricky, since you’re
splitting the infrastructure between two locations. Also, there are unique security
concerns involving data-sharing and communication between hybrid locations.
A 2013 technology adoption profile created by Forrester for Cisco Systems
showed that about half of the U.S. and European IT decision-makers surveyed
said their companies currently use IaaS. Forrester expects that number to grow
significantly. In 2013, the Gartner Group predicted a compound annual growth
rate of 42% for IaaS in the next five years.
According to Forrester, the companies that have implemented a hybrid cloud
strategy (or plan to) want consistent security policies for their data centers
and their cloud service provider. Those may include installing firewalls, using
encryption, and creating uniform policies for operations.
Companies that have implemented a hybrid cloud
strategy (or plan to) want consistent security policies
for their data centers and their cloud service provider.
9
The case for private
cloud-hosting
F
orrester’s hardware-related IT study and survey concerning budget and
trends, “Forrsights Hardware Survey, Q3 2012,” showed that, among
the SMBs and enterprise companies with two or more employees in
Europe and the U.S., 46% are prioritizing investments in private clouds in
2013. According to the survey, more than 25% said they prefer to rent one,
and more than half plan to build a private cloud in their data center.
Hosted private clouds have several benefits, including:
1.	 Easy reach and connectivity.
2.	 Enabling “future hybrid scenarios.”
3.	 Licensing and compliancy requirements are easier to meet.
4.	 Possibility of outsourcing cloud setup and management.
Whatever strategy you decide to implement, you should consider the many
benefits of hybrid cloud computing for your business
10
SOURCES:
Source: “Forrsights Hardware Survey Q3 2012,” Forrester, September 2012
Source: “Hosted Private Cloud, Q1 2013,” Forrester, February 2013
Source: “Hosted Private Cloud Wave Complete But No Leaders Identified,” Lauren Nelson’s Blog,
Forrester.com, 02/13/13
Source: “Cloud: New ways of consuming applications,”YouTube
Source: “Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges,” Cisco.
com, January 2013
Source: “20 Top Cloud Services for Small Businesses,” PCMag, 12/11/12
Source: “CloudSigma CEO Talks Hybrid Hosting,” Web Host Industry Review, 09/09/13

More Related Content

More from Business.com

Future Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureFuture Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureBusiness.com
 
Roger, Do You Copy?
Roger, Do You Copy?Roger, Do You Copy?
Roger, Do You Copy?Business.com
 
Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Business.com
 
Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Business.com
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticBusiness.com
 
Business.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com
 
Overview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comOverview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comBusiness.com
 
A Guide to Web Design- Business.com
A Guide to Web Design- Business.comA Guide to Web Design- Business.com
A Guide to Web Design- Business.comBusiness.com
 
Time and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideTime and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideBusiness.com
 
Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Business.com
 
Postage Meters Guide- Business.com
Postage Meters Guide- Business.comPostage Meters Guide- Business.com
Postage Meters Guide- Business.comBusiness.com
 
Business.com POS Systems Guide
Business.com POS Systems GuideBusiness.com POS Systems Guide
Business.com POS Systems GuideBusiness.com
 
Order Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideOrder Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideBusiness.com
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comBusiness.com
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comBusiness.com
 
Document Management Software- The Business.com Guide
Document Management Software- The Business.com GuideDocument Management Software- The Business.com Guide
Document Management Software- The Business.com GuideBusiness.com
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideBusiness.com
 
Business.com guide to 401k
Business.com guide to 401kBusiness.com guide to 401k
Business.com guide to 401kBusiness.com
 
Solving Payroll Problems With The New Employee Management System- Business.c...
 Solving Payroll Problems With The New Employee Management System- Business.c... Solving Payroll Problems With The New Employee Management System- Business.c...
Solving Payroll Problems With The New Employee Management System- Business.c...Business.com
 
What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...Business.com
 

More from Business.com (20)

Future Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a FutureFuture Selling in B2B Media: Yes, There is a Future
Future Selling in B2B Media: Yes, There is a Future
 
Roger, Do You Copy?
Roger, Do You Copy?Roger, Do You Copy?
Roger, Do You Copy?
 
Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business Stay Connected with the Right Phone System for Your Business
Stay Connected with the Right Phone System for Your Business
 
Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere Process Payroll Anytime, Anywhere
Process Payroll Anytime, Anywhere
 
Everything You Need to Know About Taking Plastic
Everything You Need to Know About Taking PlasticEverything You Need to Know About Taking Plastic
Everything You Need to Know About Taking Plastic
 
Business.com Guide to POS Systems
Business.com Guide to POS SystemsBusiness.com Guide to POS Systems
Business.com Guide to POS Systems
 
Overview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.comOverview of Recruitment Management Systems- Business.com
Overview of Recruitment Management Systems- Business.com
 
A Guide to Web Design- Business.com
A Guide to Web Design- Business.comA Guide to Web Design- Business.com
A Guide to Web Design- Business.com
 
Time and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com GuideTime and Attendance Software- A Business.com Guide
Time and Attendance Software- A Business.com Guide
 
Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com Guide to Promotional Items- Business.com
Guide to Promotional Items- Business.com
 
Postage Meters Guide- Business.com
Postage Meters Guide- Business.comPostage Meters Guide- Business.com
Postage Meters Guide- Business.com
 
Business.com POS Systems Guide
Business.com POS Systems GuideBusiness.com POS Systems Guide
Business.com POS Systems Guide
 
Order Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com GuideOrder Fulfillment Services- A Business.com Guide
Order Fulfillment Services- A Business.com Guide
 
A Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.comA Guide to IT Consulting- Business.com
A Guide to IT Consulting- Business.com
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Document Management Software- The Business.com Guide
Document Management Software- The Business.com GuideDocument Management Software- The Business.com Guide
Document Management Software- The Business.com Guide
 
Commercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com GuideCommercial Security Systems- The Business.com Guide
Commercial Security Systems- The Business.com Guide
 
Business.com guide to 401k
Business.com guide to 401kBusiness.com guide to 401k
Business.com guide to 401k
 
Solving Payroll Problems With The New Employee Management System- Business.c...
 Solving Payroll Problems With The New Employee Management System- Business.c... Solving Payroll Problems With The New Employee Management System- Business.c...
Solving Payroll Problems With The New Employee Management System- Business.c...
 
What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...What the Document Management System Revolution Means for Your Business- Busin...
What the Document Management System Revolution Means for Your Business- Busin...
 

Recently uploaded

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 

Business.com Guide to Cloud Computing- The Hybrid Model

  • 2. Legal Notice: © 2014 Business.com Media, Inc. All Rights Reserved. By reading this e-book, you agree to the following terms and conditions. Under no circumstances should this e-book be sold, copied, or reproduced in any way except when you have received written permission. As with any business, your results may vary and will be based on your background, dedication, desire, and motivation. Any testimonials and examples used are excep- tional results, which do not apply to the average purchaser and are not intended to represent or guarantee that anyone will achieve the same or similar results. You may also experience unknown or unforeseeable risks which can reduce results. The au- thors are not responsible for your actions. The material contained in this report is strictly confidential.
  • 3. Contents Welclome 4 Main Types of Cloud Computing Services 5 The Hybrid Cloud 7 The Case for Private Cloud-Hosting 9
  • 4. 4 Welcome S mall and medium-size businesses (SMBs), though initially slow to adopt cloud computing, have been making up for lost time. From a worldwide market of $16.2 billion in 2008, spending on cloud services grew 250% in four years to $42.3 billion in 2012, according to IDC. Many SMBs are realizing the advantages of cloud-hosted services. For example, cloud computing usually costs less than the same capacity would cost onsite. It’s also more readily available to your team, more secure, backed-up remotely, reducing the cost of hiring IT talent, and eliminating the need to install or update software. Cloud services are easy to scale, too; you can purchase only the services and storage you need. Just like any other technology, cloud computing is not devoid of areas of concern. Data stored in the cloud is subject to unauthorized access, not only while it is in the cloud, but also coming from and going to the cloud. There have been some spectacular examples of crashes in cloud computing already; fixing those problems is outside of your control. There are many unsettled questions as to who may legally access data stored in the cloud. When cloud storage provider Mega Upload was shut down for data piracy by government authorities in 2013, a lot of legitimate users of that service lost access to their files.
  • 5. 5 Main Types of Cloud Computing Services Cloud computing is a broad term that includes three main categories of service: 1. Software-as-a-Service (SaaS). Applications are available over a network -- typically the Internet -- often on a subscription basis. They’re hosted by a service provider or a vendor. Examples include iCloud, iTunes, iWork, Amazon Web Services, Dropbox, Evernote, Google Apps, Salesforce, QuickBooks Online, etc. 2. Platform-as-a-Service (PaaS). The provider supplies the networks, servers, storage, and other services, and the customer creates the software using tools and libraries from the provider, along with custom apps, databases, and other services -- all integrated into one platform. Examples include AppScale, Google App Engine, and Windows Azure. With Software-as-a-Service (SaaS) Applications are available over a network -- typically the Internet -- often on a subscription basis.
  • 6. 6 3. Infrastructure-as-a-Service (IaaS).The service provides servers, hardware, firewalls, storage, and various networking components. Payment is typically on per-user basis. The service provider owns the equipment, maintains it, and operates it. Examples include Amazon EC2, Rackspace OpenStack Cloud, HP Public Cloud, SoftLayer CloudLayer Computing. With the option of using private, public, or hybrid cloud-hosting services, the question is, which system should you choose? With the option of using private, public, or hybrid cloud-hosting services, the question is, which system should you choose?
  • 7. 7 The Hybrid Cloud I ncreasingly, businesses are relying on hybrid cloud solutions to ease dependency on third party services. Hybrid cloud hosting is well suited for companies that need to protect sensitive data and proprietary information. Hybrid combines the capabilities of an onsite cloud infrastructure with benefits of remote systems administration. The main advantages of hybrid cloud solutions are related to cost and on- demand flexibility. Some companies use a hybrid cloud to expand onsite capabilities and then only go to the cloud when there’s excess demand. That way, the company only pays for extra capacity when needed. In a reverse hybrid, companies can use the cloud for their everyday computing needs and tap in- house resources to cover peak needs. Some companies use a hybrid cloud to expand onsite capabilities and then only go to the cloud when there’s excess demand.
  • 8. 8 There are challenges with hybrid clouds. Implementing a seamless integration of company resources with the service provider’s can be tricky, since you’re splitting the infrastructure between two locations. Also, there are unique security concerns involving data-sharing and communication between hybrid locations. A 2013 technology adoption profile created by Forrester for Cisco Systems showed that about half of the U.S. and European IT decision-makers surveyed said their companies currently use IaaS. Forrester expects that number to grow significantly. In 2013, the Gartner Group predicted a compound annual growth rate of 42% for IaaS in the next five years. According to Forrester, the companies that have implemented a hybrid cloud strategy (or plan to) want consistent security policies for their data centers and their cloud service provider. Those may include installing firewalls, using encryption, and creating uniform policies for operations. Companies that have implemented a hybrid cloud strategy (or plan to) want consistent security policies for their data centers and their cloud service provider.
  • 9. 9 The case for private cloud-hosting F orrester’s hardware-related IT study and survey concerning budget and trends, “Forrsights Hardware Survey, Q3 2012,” showed that, among the SMBs and enterprise companies with two or more employees in Europe and the U.S., 46% are prioritizing investments in private clouds in 2013. According to the survey, more than 25% said they prefer to rent one, and more than half plan to build a private cloud in their data center. Hosted private clouds have several benefits, including: 1. Easy reach and connectivity. 2. Enabling “future hybrid scenarios.” 3. Licensing and compliancy requirements are easier to meet. 4. Possibility of outsourcing cloud setup and management. Whatever strategy you decide to implement, you should consider the many benefits of hybrid cloud computing for your business
  • 10. 10 SOURCES: Source: “Forrsights Hardware Survey Q3 2012,” Forrester, September 2012 Source: “Hosted Private Cloud, Q1 2013,” Forrester, February 2013 Source: “Hosted Private Cloud Wave Complete But No Leaders Identified,” Lauren Nelson’s Blog, Forrester.com, 02/13/13 Source: “Cloud: New ways of consuming applications,”YouTube Source: “Enterprises Seek The Benefits Of Hybrid Cloud, And Work To Overcome The Challenges,” Cisco. com, January 2013 Source: “20 Top Cloud Services for Small Businesses,” PCMag, 12/11/12 Source: “CloudSigma CEO Talks Hybrid Hosting,” Web Host Industry Review, 09/09/13