Hybrid clouds are seen as a way to resolve the debate of “public versus private” clouds.
Hybrid Cloud—Not Really
Randy Blas points out that the term hybrid usually means combining two things to make a new one. For example, hybrid cars have a single kind of new engine and power train that use either gas or electricity. It’s neither a gas engine, nor an electric engine; it’s a new kind of engine—a hybrid engine. A hybrid flower is a new flower that is a cross-breed of two flowers; it is the genetic descendent of both parents but is like neither of them. It is a new kind of flower that is a combination of both.
In cloud computing, hybrid solution often means simply private and public clouds bound together by standardized or proprietary technology that enables more or less seamless data and application portability. (This is the definition proposed by the NIST, cited earlier.) Cloud bursting, cloud bridging, or federating clouds may be better terms to use, as the NIST itself acknowledges, but it seems that the term hybrid cloud has stuck; therefore, we adopt it.
The Hybrid Cloud Model
The hybrid cloud model is a technique advocated by many IT professionals in larger organizations. Moving some less sensitive or less critical applications, such as HR, CRM, and collaboration, to the cloud (where larger vendors such as Salesforce.com have built successful followings) delivers strong business value, while applications involving sensitive and proprietary information can remain either on premises or in private clouds until security, compliance, and governance issues in the cloud are unambiguously resolved.
Another possibility is to use the public clouds for overflow capacity. The hybrid model is customarily accomplished by a virtual private connection (VPN) between the public and private clouds, in which the data traveling over the VPN is generally not visible to, or is encapsulated from, the underlying network traffic. This is done with strong encryption. Internet Protocol Security (IPsec)9 is a commonly used protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a datastream.
Cloud Computing Related Interview Questions
|Adv Java Interview Questions||UNIX/XENIX Interview Questions|
|Red Hat Linux System Administration Interview Questions||Microsoft Azure Interview Questions|
|Amazon Web Services (AWS) Interview Questions||Unix/Linux Interview Questions|
|KVM Interview Questions||Linux Virtualization Interview Questions|
|Aws Cloud Architect Interview Questions||Salesforce Crm Interview Questions|
|Azure Cosmos DB Interview Questions|
Cloud Computing Related Practice Tests
|Adv Java Practice Tests||UNIX/XENIX Practice Tests|
|Red Hat Linux System Administration Practice Tests||Microsoft Azure Practice Tests|
|Amazon Web Services (AWS) Practice Tests|
Cloud Computing Tutorial
Cloud Computing Is A True Paradigm Shift
From Do It Yourself To Public Cloud—a Continuum
Cloud Computing: Is It Old Mainframe Bess In A New Dress?
Moving Into And Around The Clouds And Efforts At Standardization
Cloud Economics And Capacity Management
Demystifying The Cloud: A Case Study Using Amazon’s Cloud Services (aws)
Virtualization: Open Source And Vmware
Securing The Cloud: Reliability, Availability, And Security
Scale And Reuse: Standing On The Shoulders Of Giants
Google In The Cloud
Enterprise Cloud Vendors
Cloud Service Providers
Practice Fusion Case Study
All rights reserved © 2018 Wisdom IT Services India Pvt. Ltd
Wisdomjobs.com is one of the best job search sites in India.