Saturday, January 31, 2015

Cloud Computing Explained




This month I will address the ever increasing prevalence and reliance on cloud computing and storage of your data. It is timely as quite often I am queried on it by customers and many seem confused about exactly what it is and how it affects them.I hope this article clears up some of the confusion regarding cloud technology.


Cloud Computing – The Origin
You could be, based on what is put on in the media, excused for believing that cloud computing is a “new” technology. It’s not – it’s been around virtually since the beginning of computers and it was because of the original cloud computing model that personal computers, in part, became popular. Back in the early days of computers, before pc technology, all information was stored on large “mainframe” computers.  The only way you could access it was via those old terminals you see in the movies from the 1970’s. These large computers were expensive and you needed to employ teams of programmers and technicians to keep the whole show on the road.

Cloud Computing – The Achilles Heels
If the mainframe failed you were offline with no access to your information. Cloud computing as we know it today is no different and is simply an old, old idea with some new clothes added. Make no mistake cloud computing is primarily aimed at creating a model where you, the consumer, will eventually pay for that which you have come to understand is free. In other words you will eventually pay to store your information on the cloud be it your email, photos, or data.

Cloud computing requires you to delegate to some unknown and untested entity responsibility for the storage and safeguarding of your information. In reality you were never actually offered the choice but it was introduced by stealth. Cloud computing got a foothold with the free email offered first by Microsoft in the form of hotmail and followed by numerous other free email services.

For a basic understanding of cloud computing and the risks consider the following: It is equivalent to leaving your wallet in someone’s house on the assumption that they will safeguard it with the same amount of diligence as yourself. It is a false and dangerous assumption and the failure of cloud computing security can be witnessed by a myriad of cases where email and storage accounts have been hacked on the cloud.

Next month I’ll continue on this subject with some practical suggestions on how you can reduce the risks associated with its use.



Oliver Reidy is a computer technician and has been in the industry since 1981. This article, and all previous articles, are available to view online at http://reidyonline.blogspot.ie/ or www.reidyonline.com/blogspot.htm