The 6 layers of the Cloud Computing Stack

Crisis Response Using Cloud Computing

By G C Network | May 31, 2017

    Cloud computing is more than servers and storage. In a crisis situation it can actually be a lifesaver. BlackBerry, in fact, has just become the first cloud-based crisis…

Cloudy Thinking and Digital Transformation

By G C Network | May 30, 2017

(Originally posted on the Engility Corporation Blog)   There’s a lot to gain from cloud computing, but success requires a thoughtful and enterprise focused approach. Cloud computing decouples data and…

Blockchain Business Innovation

By G C Network | May 18, 2017

Is there more than bitcoin to blockchain?   Absolutely, because today’s blockchain is opening up a pathtowards the delivery of trusted online services.   To understand this statement, you need…

How Quantum computing with DNA storage will affect your health

By G C Network | May 5, 2017

By Guest Contributor: Taran Volckhausen, Contributing Editor at Vector (https://www.indexer.me)   Moore’s Law, which states that processing speeds will double every two years as we cram more and more silicon…

36 Shades of Hybrid IT

By G C Network | April 29, 2017

Photo credit: Shutterstock Everyone has heard of the 50 Shades of Grey. But do you know the “36 Shades of Hybrid IT”? These shades are a new way of describing…

Digital Transformation Driven by ITaaS

By G C Network | April 15, 2017

Photo credit: Shutterstock   When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from…

IBM Interconnect 2017: Cloud, Cognitive and Data!

By G C Network | April 4, 2017

A couple of weeks ago while attending IBM Interconnect 2017 I had the awesome opportunity to participate in the IBM Interconnect 2017 Podcast Series with Dez Blanchfield. I not only…

The BYOD Problem

By G C Network | March 31, 2017

Everyone wants their device of choice right there next to them 24/7.  To an employer, however, that smart device is nothing more than a dagger posed to rip apart every…

Both Sides of Enterprise Mobility

By G C Network | March 16, 2017

Photo credit: Shutterstock Enterprise mobility has become table stakes in the world of business.  The ability to access current information at any time, from anywhere, on any device has really…

Cloud Computing Forensics Readiness

By G C Network | March 8, 2017

Photo credit: Shuterstock In today’s globally connected world, data security breaches are bound to occur. This, in turn, increases the importance of digital forensic readiness, or the ability to access…

From Sam Johnston’s Taxonomy post

Follow me at https://Twitter.com/Kevin_Jackson

G C Network

2 Comments

  1. Randall on October 7, 2008 at 10:35 am

    You don’t mention where security fits in this stack. I know security is important at every level and it is there at every level now, but really there should be a single source of secure control of access to resources.

    That’s something big we need to work out. How can I have one account, the account I use to log into my cloud application and I can use that application with any other layer of stack or in combination with them without having to know that amazon requires these credentials and nirvanix requires another set.

    The end user shouldn’t care about these things, it should be handled at the platform level, but from my perspective there is no robust security model for the cloud, not yet.

    Any ideas what we might see fill this gap?



  2. Sam Johnston on March 4, 2009 at 10:52 pm

    Actually security is something that I do think about as a CISSP, but having looked at the various solutions it was clear that they permiated every layer of the stack. The resources themselves are secured by various mechanisms (AWS request signing for example) and from the user point of view you have OpenID and OAuth at the services layer. Even on the clients we don’t want cloud apps interfering with each other and you can see that browsers like chrome go to great lengths to prevent this.

    So yes it’s a valid point, but not one that wasn’t well considered.

    Cheers,

    Sam