Information Technology
Customization and Standardization: A View of Cloud and Grid Computing
Sequencing a genome, storing vast video libraries, or utilizing a non-essential application for occasional use are all functions performed within the realm of information technology. Meeting a particular task need was once the challenge of the end user or organization to ascertain their current and future use to guide their technology purchases. In the not so distant past, limitations of hardware or budget constrained the application of technology. Networking information technology proved one solution to sharing resources and boosting capabilities, while at the same time allowing for centralized governance models to facilitate access and protect privileged information.
As the capabilities of technology advance in computational power, storage, and connectivity, new uses emerge to enhance the capabilities of science, business, and individuals. Scalability, the matching of correct resources to a particular need in time, both up and down, has long proved an elusive target for users and organizations. As specialized organizations with robust computing networks and a common interest sought to enhance the capabilities, grid computing emerged to enable pooled resources.
The newest label for large-scale, shared resources is 'cloud computing.' References to 'the cloud' raise questions of whether this is a unique approach to delivering scalable resources, or merely a breezy marketing label for grid computing. Ian Foster et al. survey this question in a 2008 conference paper entitled, "Cloud Computing and Grid Computing 360-Degree Compared," (Foster, Zhao, Raicu & Shiyong 2008). Lacking a definite line of demarcation between grid and cloud computing is best characterized by noting the overarching goal of both, "the vision is the same -- to reduce the cost of computing, increase reliability, and increase flexibility by transforming computers from something that we buy and operate ourselves to something that is operated by a third party," (Foster, Zhao, Raicu, & Shiyong, 2008).
This paper provides an exegesis of the survey, by Foster et al., of Grid and Cloud platforms, as well as a focus on the particulars aspects that most concretely differentiate. The method of this paper briefly follows the course of Foster et al. through six areas. Through the business model, architecture, resource management, data models, applications, and security a clearer view of the similarities and differences of the Grid and the Cloud emerge. This paper refrains from long-term predictions of convergence upon a single grid or cloud-computing paradigm, but does note trends that fit with a more general theme of computing as a utility.
Business model
The most visible differentiating characteristic between cloud and grid computing lies with the business model. Foster et al. largely accept that the evolutionary course of information technology is comprised of three main functions: computation, data storage, and connective infrastructure. In his famous article, "IT doesn't matter," Nicolas Carr noted that, "the core functions of IT -- data storage, data processing, and data transport -- have become available and affordable to all," while arguing that a technology-based business strategy relied upon maintaining proprietary capabilities (Carr, 2003). Foster et al. note an egalitarian business model that integrates Carr's view in, "a cloud-based business model, a customer will pay the provider on a consumption basis, very much like the utility companies charge for basic utilities such as electricity, gas, and water, and the model relies on economies of scale in order to drive prices down for users and profits up for providers," (Foster, Zhao, Raicu, & Shiyong, 2008).
In contrast, Foster et al. note that the Grid computing business model, "is project-oriented," and rationed through a currency of "service units," (Foster, Zhao, Raicu, & Shiyong, 2008). Grid computing resembles a co-operative, in that joining integrates your node into a larger external network that enables shared use, and creates the experience of a virtual organization, that Foster et al. define as, "a logical entity within which distributed resources can be discovered and shared as if they were from the same organization," (Foster, Zhao, Raicu, & Shiyong, 2008).
Security & Architecture
While both represent large scale sharing of resources aimed at enabling a dynamic scaling of resources to match needs, a divergence of architecture and accessibility provides another key point of differentiation between the Grid and the Cloud.
If operational continuity is viewed as a security issue, then clearly the Grid retains an edge over the Cloud in the event of service or connection disruptions. Due to the fact that the Grid is comprised of smaller nodes that connect for resource sharing, the node retains core capabilities should an outage to the larger network occur. The cloud also retains the end user, or node, capabilities, however depending upon the type of services employed from the cloud may...
Problem Solving Case Study Merging Information Technology and Cultures at Compaq-Digital (B): Becoming a Single Firm The many challenges and opportunities evident for Compaq and Digital Equipment Corporation (DEC) illustrated in the case study Merging Information Technology and Cultures at Compaq-Digital (B): Becoming a Single Firm are analyzed and evaluated from a strategic perspective in this analysis. Both companies have drastically different cultures, which made the challenges, opportunities and threats of the merger
ERP and Information Security Introduction to ERP Even though the plans of information security include the prevention of outsiders to gain access of internal network still the risk from the outsiders still exists. The outsiders can also represent themselves as authorized users in order to cause damage to the transactions of the business systems. Therefore, strict prevention measures should be taken to avoid such situations. The threats of both the hackers have been
For the C-level executive team at Oasis the most critical strategic decision with regard to Web 2.0 technologies is processes, systems and functional areas can take the greatest advantage of their benefits. It is clear that the globally-based distributed order management process could be much more collaborative given its breadth of activity across so many manufacturing centers. The need for creating a collaborative distributed order management system globally is
This allows for greater levels of planning and cooperation, and fills in the information gap that currently exists between the factory floor and the rest of the supply chain. Lexmark provides an example of waste. Recently, the company found itself with more than $1 million in scrap from one lot. Engineers had insufficient information to isolate and fix the problem, so were instead relegated to crisis control. With more accurate
Leagility with regard to the supply chain is simply a combination of techniques designed both to exploit a volatile marketplace but also to take advantage of a lean one where profit margins are relatively low but demand is relatively high. In the article analyzed, food markets in particularly are examined with regard to supply chain design. There are according to the authors, a number of food products that "can be
Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now