Public Cloud, Private Cloud and Dedicated Cloud Services

When we talk about cloud computing, we also talk about the types of clouds that we consume (utilize). You remember the taxonomy to cloud, we presented some more posts ago, here on the blog right? We talked about IaaS, PaaS, SaaS and its services. We talk about the capabilities present in a cloud platform exemplifying its own resources of the Windows Azure platform.

Now I would like to highlight the types of clouds that can work. At this point, we can think of public cloud, private cloud and dedicated cloud computing.

Public cloud services are the offers we have on the general market through providers like Microsoft, Amazon, Salesforce.com, IBM, Google, ESDS, among others. In this type of supply, access is via the internet and share data centers with various companies in the world.

Thinking about a more customized solution, private cloud services can deliver the benefits of dynamic provisioning and economy of scale, leveraging the infrastructure of data centers already invested by the company. Thus, companies that own their own data centers can evaluate the model of virtualization and provisioning with the creation of a private cloud, which is only available to users and enterprise applications. A limitation of this model is that, beyond the scalability, it is limited to the size of the investment already made in own data center, the company remains responsible for the routine administration of physical hardware resources, as well as software development and upgrades needed.

Finally, dedicated clouds can offer the benefits of abstraction in a data center market with the isolation and customization that a company can imagine. This type of offer usually involves security matters, as like local users (on-premise) with the users and applications placed in the cloud and allows integrated scenarios, highly flexible hardware and provisioning for businesses.

From these three sets of clouds, it is natural to think of the clouds by addressing issues of authentication, authorization and security between users of each room booked.


Leave a Reply

Follow by Email