Cloud Possible: Best Cloud Model for the Job – Installment #2

In May, we published our first installment of Cloud Possible: Mission Critical for Utilities, we explored Public and Private cloud, the 2 primary cloud deployment models and the considerations for mission critical applications for Utilities. In this installment, we’ve decided to break it up into shorter more frequent posts, but we’ll introduce three Cloud Service Models: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). In future installments we will evaluate each of these models. Much like in our first installment, we’re reviewing some content that’s been around for a while now – but we’re addressing this in the context of mission critical enterprise applications. As always we are looking at it specifically for utilities, where for valid reasons, cloud adoption may be less common than in other industries. As we begin this installment, it’s important to note that evaluation of these models will require an understanding and desire for simplification, efficiency and economies of using multi-tenant cloud provider services, balanced against the requirements to maintain the control, flexibility, and ability to customize in order to deliver productive and compliant applications to stakeholders.

Cloud Possible: Infrastructure as a Service (IaaS) – Installment #3

In our third installment of the Cloud Possible Series we discuss Infrastructure as a Service (IaaS), one of three types of cloud deployment models. Here we discuss the requirements of the Utility and the benefits that this model provides.

For Utilities who have the greatest requirement for flexibility and control, the IaaS operating model is the best choice. This model is closest to a dedicated on-premise computing environment. Utilities who choose an IaaS model to receive a scalable infrastructure, with the ability to grow compute, storage, and network on demand. In addition to infrastructure, IaaS providers often offer a variety of additional services: firewalls, load balancers, IP addresses, VLANs, data protection/backups, encryption, colocation, cross-connects, and internet connections.