• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • Contact Us

iHash

News and How to's

  • Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106

    Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106
  • S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

    S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579
  • eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

    eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119
  • eufy SpaceView Add-On Video Baby Monitor for $99

    eufy SpaceView Add-On Video Baby Monitor for $99
  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

2023 Trends in Cloud Computing  

Dec 21, 2022 by iHash Leave a Comment

The cloud—including applications at its core, the edge, and in the Internet of Things (IoT)—has become the de facto environment of choice for the computational and storage necessities of modern data management.

Although not quite indistinguishable from the data ecosystem itself, the cloud factors significantly into almost all workloads involving aspects of data science, Artificial Intelligence, transactional systems, DevOps, customer interactions, and more. As an indicator of its ubiquity, Gartner announced spending on global public cloud services is estimated to reach approximately $500 billion in 2022.

Consequently, developments in cloud computing are demonstrative of those affecting data-driven processes as a whole. These trends include cloud native mechanisms that make the cloud more utilitarian, regulatory compliance and data governance concerns that make it sustainable, edge processing and IoT deployments that typify its celerity, and its increasing decentralization of enterprise architecture.

These phenomena signify both challenges and opportunities. They also herald a realization of an information technology world that’s markedly different from that of even a few years ago, in which organizations “used to have everything in one place,” reflected Steve Madden, Equinix VP of Global Segment Marketing.  “Now, [they’ve] got to manage things in lots of places. That’s hugely complicated. But if you’re subscribing to, as a service, only components or elements from those locations… now [you’re] just controlling the use of it.”

Cloud Native

Cloud native constructs will always represent the vanguard of cloud computing and cloud architecture. They’re intensely practical for increasing the manageability of the cloud as a means of decentralizing data virtually anywhere. Established cloud native techniques involving containers, orchestration platforms, microservices, and Infrastructure as Code (IaC) will maintain relevance in 2023. However, they’ll be assisted by developments in: 

  • Event Brokers: Cloud native event brokers are a form of event-driven architecture that supplement microservices by enabling systems to communicate with one another through event data. This capability has real-time implications for the IoT and edge computing. It’s also useful for integrating with SaaS offerings. For such vendors, “cloud-native event broker solutions make it easy to pipe events from anywhere into [B2B SaaS vendors’] software, and therefore satisfy their end users’ demands,” mentioned Sebastien Goasguen, TriggerMesh CEO.
  • FinOps: FinOps is an emergent discipline for monitoring, managing, and paring cloud costs. “FinOps processes and roles will grow rapidly and become standard in most enterprises, along with the tools that enable FinOps, such as resource and cost optimization,” predicted Rich Bentley, StormForge VP of Marketing.
  • Platform Engineering: According to Lightbend CEO Jonas Bonér, this concept is designed to help developers “climb the ladder of abstraction,” when devising applications or web pages. Platform engineering facilitates greater self-service functionality for developers, in part via an Internal Developer Platform that lets developers consume events from multiple services. “Event brokers can help connect to such systems without needing to directly access them or needing to understand the intricacies of how to integrate with them,” Goasguen indicated.
  • Serverless Computing: Although serverless computing is no longer a novelty, recent improvements made by purveyors such as AWS have made it an even more viable alternative to “challenges deploying applications on cloud-native infrastructure because the Kubernetes/Cloud Native Computing Foundation ecosystem is overwhelmingly complex,” Bonér posited.

The employment of AI will also expand in cloud native environs to “automate many of the tasks involved in managing cloud resources, such as provisioning, scaling, and monitoring,” Bentley added.

Data Sovereignty, Data Integrity 

The days in which the cloud was perceived as exacerbating regulatory compliance and data governance seem to be rapidly waning. According to Pavel Burmenko, General Manager of Veeva Clinical Database at Veeva Software, the cloud is now desired for its ability to reinforce data sovereignty and data integrity “because cloud providers are delivering compliant systems now.” This realization is particularly acute for public cloud deployments. “They can ensure data is stored in a particular geography because of the distributed nature of cloud computing,” Burmenko explained. “Global cloud providers have the geographic footprint to support this.”

A particularly prominent trend pertaining to data integrity is the expanding sophistication in the workflow capabilities of cloud environments—which reinforces data governance, data provenance, and regulatory compliance. This greater degree of accountability is primed for distributed work environments that are no longer silos because of what Burmenko termed “function-specific audit trails and workflows.” Specifically, “If I’m working in a cloud application, that application knows what my assigned role is,” Burmenko said. “It knows that I’m working on a specific project and that I’m supposed to perform my task after another person has performed it. The application is recording my activity in a way that’s reproducible. If an auditor comes from a regulatory body, we can give them an evidence trail of everything that’s been done.”

Edge Analytics

Effectual management of cloud resources via cloud native technologies, coupled with prudent data governance for data integrity, is the formula for reaping the benefits of the cloud as an enterprise enabler. Some of the advantages that exemplify the cloud’s premise of low latent, highly scalable applications anywhere involve advanced analytics at the cloud’s edge. Madden noted that “the cloud is also becoming a misnomer because a lot of the infrastructure you’re running at the edge is, in [many] cases, available in a bigger cloud backend warehouse.” This sentiment especially applies to cognitive analytics deployments like evaluating medical images.

“MRIs are getting so good that each scan is 28 gigabytes,” Madden revealed. “If you’re doing those 50 times a day across several hospitals in a city, that data is huge. Sending it all back [to the cloud’s core] and down again can cost thousands of dollars and lots of time.”  With edge AI, however, organizations are “storing, processing, and managing data right where it is produced and consumed, while using the cloud for data backup, more thorough data analysis, and a holistic system view,” Bonér put forth.

Transmitting only the results of analytics to the cloud’s core is more timely, cost-effective, and sustainable. Madden articulated a use case in which a medical facility input Alexa in patients’ rooms for real-time analysis of their needs for contacting nurses while automating logistical concerns like changing the channel. “It reduced the amount of contact between nurses and patients during Covid by 80 percent,” he recalled. “It saved lives.”

The IoT 

The IoT will continue to be one of the most impressive expressions of the cloud in the next 12 months. Digital twin applications are broadening the former’s utility beyond industrial settings to enterprise ones with interactive models of systems. The IoT allows organizations to enlarge the data quantities, while reducing the latency, for mission-critical applications such as clinical trial testing. Wearable devices, for example, let researchers “ask research questions for a clinical project that are going to be answered by smart devices that are able to collect the data we use for answering our clinical questions,” Burmenko disclosed.

Analysis of continuous, real-time bio-metric data is much more effective than traditional research methods involving daily questionnaires and other qualitative measures. “The volume of data coming from a wearable is so substantially greater than the volume of data used in clinical trials historically, that the cloud almost becomes the de facto place that enables this research to happen,” Burmenko observed.

The Edge to Cloud Continuum 

The reality is that such a use case could easily become an edge computing one, depending on the infrastructure in place and enterprise definitions of it. “The edge consists of many hierarchical layers between the cloud and the devices; each layer is further away from the cloud but closer to the end-users: a cloud-to-edge continuum,” Bonér confirmed. To that end, the edge becomes a singular expansion of the cloud, and a natural progression for enterprise deployments of the cloud’s cardinal boons of scalability, elasticity, low latency, and modest storage costs.

Defining the edge, and relying on it as a means of supplementing the cloud’s core, is crucial to availing organizations of this macro level development in cloud architecture. The edge, then, is not necessarily individual end point devices, but rather a local, metropolitan “aggregation point of all those technologies, devices, and traffic that come together to be stitched together into a business process and start revenue-generating,” Madden said. “The core is regional for how to understand, across a whole region, what’s going on.”

About the Author

Jelani Harper is an editorial consultant servicing the information technology market. He specializes in data-driven applications focused on semantic technologies, data governance and analytics.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: https://twitter.com/InsideBigData1

Join us on LinkedIn: https://www.linkedin.com/company/insidebigdata/

Join us on Facebook: https://www.facebook.com/insideBIGDATANOW

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106

    Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106
  • S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

    S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579
  • eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

    eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119
  • eufy SpaceView Add-On Video Baby Monitor for $99

    eufy SpaceView Add-On Video Baby Monitor for $99
  • eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

    eufy Solo IndoorCam C24  (2K, 2-Cam Kit, Plug-in) for $75

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

Gootkit Malware Continues to Evolve with New Components and Obfuscations

Jan 29, 2023 By iHash

Apple iPad Air 2, 16GB – Silver (Refurbished: Wi-Fi Only) for $106

Jan 29, 2023 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news cybersecurity Cyber Security cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS 7 iOS 8 iPhone Malware microsoft network security ransomware ransomware malware risk management Secure security security breaches security vulnerabilities software vulnerability the hacker news Threat update video Vulnerabilities web applications

Latest

@insideBIGDATApodcast: ChatGPT – The Human AI Partnership

Welcome to the insideBIGDATA series of podcast presentations, a curated collection of topics relevant to our global audience. We bring you compelling topics including: big data, data science, machine learning, AI, and deep learning. Enjoy! For this installment, we bring you the second episode of Fireside Chatbots featuring Greylock general partner Reid Hoffman and ChatGPT, […]

S300 eufyCam (eufyCam 3C) 3-Cam Kit for $579

Expires January 03, 2123 19:28 PST Buy now and get 0% off KEY FEATURES See 4K Detail Day and Night 180-Day Battery Life Up to 16 TB Expandable Local Storage (Additional Storage Drive Not Included) BionicMind AI Differentiates Family and Strangers HomeBase 3 Centralize Security Management PRODUCT SPECS Resolution 4K (3840×2160)° Night Vision Infrared & […]

eufy Baby Monitor 2 (2K, Smart, Wi-Fi) for $119

Expires January 04, 2123 21:35 PST Buy now and get 0% off KEY FEATURES It’s in the 2K Details: The 2K high-resolution camera with 330 pan, 110 tilt, and 4x zoom features lets you watch over your baby in stunning detail. Night Vision: The non-invasive infrared night vision lets you check on your baby at […]

ISC Releases Security Patches for New BIND DNS Software Vulnerabilities

Jan 28, 2023Ravie LakshmananServer Security / DNS The Internet Systems Consortium (ISC) has released patches to address multiple security vulnerabilities in the Berkeley Internet Name Domain (BIND) 9 Domain Name System (DNS) software suite that could lead to a denial-of-service (DoS) condition. “A remote attacker could exploit these vulnerabilities to potentially cause denial-of-service conditions and […]

eufy Solo IndoorCam C24 (2K, 2-Cam Kit, Plug-in) for $75

Expires January 04, 2123 21:34 PST Buy now and get 0% off KEY FEATURES Knows Whos There: The on-device AI instantly determines whether a human or pet is present within the cameras view. The Key is in the Detail: View every event in up to 2K clarity (1080P while using HomeKit) so you see exactly […]

eufyCam 2 Pro Add-on Camera for $169

Expires January 06, 2123 22:33 PST Buy now and get 0% off 2K Resolution: When it comes to security, the key is in the detail. See exactly what is happening in and around your home in crisp 2K clarity. A Years Security from 1 Charge: Avoid frequent trips to charge the battery and enjoy 365-day […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2023
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT