Premium Content

Access "Portable, cloud-based virtual data centers? Sure, why not?"

Published: 28 Feb 2014

I'm wondering if the battle between Infrastructure as a Service (IaaS) cloud platforms is even worthy of debate. That's because it seems that the ultimate goal of any IaaS platform is to give organizations the ability to abstract the data center and run its resources from anywhere, on any service. I'm asking a larger question: What happens when you are able perform a physical-to-virtual (P2V) conversion of the entire data center? Keith Townsend Let's fast forward the conversation around cloud computing by a few years. What happens when Moore's Law, which dictates that computing capabilities double every 18 months, catches up with cloud? There will be an unavoidable effect on cloud computing. If we draw an intersection between the virtual data center and cloud computing, we come up with a model of computing that's much more abstract than it is today. Today, we have to consider compute, network and storage compatibility as part of an organization's IaaS strategy. When we have complete abstraction, however, compatibility becomes less of an issue. Just as server... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside


More Premium Content Accessible For Free

  • How to manage and monitor the converged network

    The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle ...

  • What does WebRTC video mean for the network?

    WebRTC, an emerging standard for embedding voice and video-conferencing applications into Web browsers, is aimed at making real-time communications ...

  • Context makes network security policy smarter, but not easier

    Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...