Welcome!

Artificial Intelligence Authors: Zakia Bouachraoui, Liz McMillan, Elizabeth White, Yeshim Deniz, William Schmarzo

Blog Feed Post

There isn't a "Cloud Layer" ... Oh wait, maybe there is?

We're all familiar with the 9-layer OSI model - 7 layers of technology + Politics and Religions. This is the stack that makes up the Internet. Cloud Computing uses the same underlying technologies, but is often discussed in the context of the IaaS, PaaS and SaaS stacks.

Nowhere in the OSI stack do you see a "cloud layer". As my colleague and noted cloud computing expert James Urquhart likes to say (paraphrased), "There is no cloud layer (in a technology sense), it's all about new operational models."


For a while I accepted that statement without giving it much thought or rebuttal. But some activities over the last couple months have gotten me thinking that maybe this isn't actually true. Let me try and explain.

One could argue that the OSI model (the technical stuff, Layers 1-7) defines all the layers that make up the Internet. But as we all know, the Internet evolved in ways that the DARPA's founding fathers never intended or envisioned back in the 1960s. Things like NATs, or VPNs, or L3-over-L2 technologies, 4-to-6 tunnels, or other overlays like MPLS. Those technologies use the layers of the OSI model, but in reality they add new "layers" to the Internet stack to deal with either legacy designs or new usage models. Sometimes they solved problems and other times they created new problems and added more additional layers (eg. NAT traversal technologies for multi-media)

All of those "additional layers" of the Internet were focused on new ways to route packets, address or hide networks, manage legacy network transitions. Very network-centric issues.

In cloud computing, the more central issues are focused on APIs, mobility of workloads (or VMs), obfuscating layers of complexity, making workloads "dynamic" in scale or availability, and transitioning from legacy architectures to new architectures. Some of these involve new operational models (DevOps, "built to fail", etc.) as James Urquhart pointed out. But within that context, we're already starting to see some new layers emerge to be able to actually make the technology more useable or provide greater levels of flexibility. Let's take a look at a few examples:
Read more »

Read the original blog entry...

More Stories By Brian Gracely

A 20 year technology veteran, Brian Gracely is VP of product management at Virtustream. He holds a CCIE #3077 and an MBA from Wake Forest University.

Throughout his career Brian has led Cisco, NetApp, EMC and Virtustream into emerging markets and through technology transitions. An active participant in the virtualization and cloud computing communities, his industry viewpoints and writing can also be found on Twitter @bgracely, on his blog Clouds of Change and his podcast The Cloudcast (.net). He is a VMware vExpert and was named a "Top 100" Cloud Computing blogger by Cloud Computing Journal.

IoT & Smart Cities Stories
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...
Rafay enables developers to automate the distribution, operations, cross-region scaling and lifecycle management of containerized microservices across public and private clouds, and service provider networks. Rafay's platform is built around foundational elements that together deliver an optimal abstraction layer across disparate infrastructure, making it easy for developers to scale and operate applications across any number of locations or regions. Consumed as a service, Rafay's platform elimi...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, Sandy Ca...
New competitors, disruptive technologies, and growing expectations are pushing every business to both adopt and deliver new digital services. This ‘Digital Transformation’ demands rapid delivery and continuous iteration of new competitive services via multiple channels, which in turn demands new service delivery techniques – including DevOps. In this power panel at @DevOpsSummit 20th Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, panelists examined how DevOps helps to meet the de...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.