The 6 layers of the Cloud Computing Stack

The Endpoint Imperative: In a Software World, Hardware Does Matter

By G C Network | January 9, 2018

Hardware matters. From productivity to security to innovation, make sure your machines can keep up. Intel’s Sarah Wieskus joins The End Point Imperative: A Podcast series from Intel to discuss…

IT Transformation with Watson

By G C Network | January 5, 2018

Credit: Shutterstock by Kevin Jackson & Dez Blanchfield   IBM recently launched an exciting new project in the form of a podcast series produced and hosted Dez Blanchfield, appropriately titled the…

The Endpoint Imperative: A Form Factor Renaissance

By G C Network | December 22, 2017

Workplace expectations are changing, and along with them, the devices we use to do our jobs. In this episode of “The End Point Imperative”, Intel’s Sarah Wieskus tells us about…

Cloud Storage 2.0 Set To Dominate Market

By G C Network | December 19, 2017

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from…

Top “Cloud Musings” Posts For 2017

By G C Network | December 17, 2017

    ( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud…

The Endpoint Imperative: ID’ing and Overcoming the Stumbling Blocks to Digital Transformation

By G C Network | December 6, 2017

Digital Transformation is the No 1 priority for organizations large and small. It’s imperative that IT remove any obstacles to digital transformation success – including outdated PCs and mobile devices.…

Industry Verticals Tackle Unstructured Data

By G C Network | December 1, 2017

  Organizations around the world are struggling to cope with the current data explosion. A vital characteristic of this data is that it is unstructured and represents things like email,…

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

By G C Network | November 27, 2017

Cloud, mobility and the Internet of Things have obliterated the traditional perimeter that protected organizations. The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management.…

The Data Storage Explosion

By G C Network | November 25, 2017

Cloud computing innovation will power enterprise transformation in 2018.  Cloud growth is also driving a rapid rise in the storage market, exacerbating the enterprise challenge around storage cost and complexity.…

Digital Transformation Drives Mainframe’s Future

By G C Network | November 15, 2017

  Digital Transformation is amplifying mainframe as mission critical to business growth more than ever before. With 70% of the world’s corporate data and over half of the world’s enterprise…

From Sam Johnston’s Taxonomy post

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Randall on October 7, 2008 at 10:35 am

    You don’t mention where security fits in this stack. I know security is important at every level and it is there at every level now, but really there should be a single source of secure control of access to resources.

    That’s something big we need to work out. How can I have one account, the account I use to log into my cloud application and I can use that application with any other layer of stack or in combination with them without having to know that amazon requires these credentials and nirvanix requires another set.

    The end user shouldn’t care about these things, it should be handled at the platform level, but from my perspective there is no robust security model for the cloud, not yet.

    Any ideas what we might see fill this gap?



  2. Sam Johnston on March 4, 2009 at 10:52 pm

    Actually security is something that I do think about as a CISSP, but having looked at the various solutions it was clear that they permiated every layer of the stack. The resources themselves are secured by various mechanisms (AWS request signing for example) and from the user point of view you have OpenID and OAuth at the services layer. Even on the clients we don’t want cloud apps interfering with each other and you can see that browsers like chrome go to great lengths to prevent this.

    So yes it’s a valid point, but not one that wasn’t well considered.

    Cheers,

    Sam