Cloudy with a Chance of Connection

Cloud Computing, A World Connected

How Stuff Works? Assignment

Image comes from Wajeeha blog.

Image comes from Wajeeha blog.

Things to Know Before Diving In (or, swimming up?)

If you are like me and have a love/hate  relationship (with a lot of cursing involved) with your computer, techie jargon is less than fun to decipher. So, this is a brief, and not at all exhaustive, list of terms (with definitions) to refer back to whenever necessary (which I will probably be doing often).

Intranet vs. Extranet – An intranet is a private network, usually used by companies, that is founded on internet technologies but is inaccessible to the global internet community. An extranet is an intranet that is shared between more than one organization, making it accessible to particular individuals outside of the specific company but still remains inaccessible to the main internet community (an example on the BBC website was that of inventory management) (Schofield). As a way to assist companies with intranets and extranets in relation to cloud computing, Google released the Google Search Appliance, which allows users in a company to search through their documents and other data in much the same way an internet user would search for information through a search engine (though it comes with a hefty price tag).

Client Computer (or computer network) is the physical computer owned and operated by the client rather than the cloud operator. This could be a personal computer, work computer, or set of computers in either the home or the work place that is/are going to be linked to the cloud system (Strickland).

Back End vs. Front End – With cloud computing, there is the Front End, which is the user interface (this can be in the form of mobile music apps like Amazon Player or iTunes), and the Back End, which is the server and cloud-computing services (Strickland; Crawford). One of the main concerns with cloud services (along with issues of security and privacy) is that as more and more users come to depend on cloud services, users will no longer need to rely as heavily on IT specialists, so those workers will find more jobs on the Back End than the Front End (Strickland, “Cloud Computing”).

Middleware is a software that allows computers on a network to talk to one another and is part of the central server (Strickland, “Cloud Computing”). An example of this would be Oracle Fusion.

Redundancy here is defined as the process of making copies of data for backup. Since the cloud is information on a hard drive not owned by the client (think of cloud computing as renting digital space), the owner of whichever cloud system is being used (Google, Amazon, and Apple are top contenders) then makes copies of data to different physical computers in case of a computer crashing, power outage, and the like. Redundancy is necessary to keep the cloud operator from losing a client’s data (so pitchforks aren’t necessary…most of the time). (Strickland, “Cloud Computing”)

Grid Computing System “is a computer network in which each computer’s resources are shared with every other computer in the system.” This provides great possibilities for researchers who require high processing power from computers than what an individual computer is capable of, especially if the grid system was the basis for the cloud system (Strickland, “Grid Computing”).

Server Virtualization is a nifty procedure that tricks a server into thinking that it is actually multiple servers, “each with its own operating system” (OS), which in turn eliminates a lot of “unused processing power” and reduces how many computers are actually necessary (Strickland, “Cloud Computing”)

Autonomic Computing is mostly theoretical at the moment, with labs like NEC Laboratories America doing research on how to create such systems. This type of system would hypothetically manage itself in regards to repairs and problem prevention within a networked system, which also has the potential to decrease IT jobs considerably as the system would be taking care of itself (Strickland, “Cloud Computing”).

Authorization Format is a procedure that would give users limited access to “data and applications relevant to [their] jobs.” This is a way for clients and cloud operators to strengthen privacy, along with authentication (which is what we do when we type in passwords to Google Drive, iTunes, and a whole host of other applications that we use on a daily basis) (Strickland, “Cloud Computing”). Privacy and security are both big issues for those who are trying to decide whether cloud services are right for them and/or their companies as the client is allowing the cloud operator to take data and store it in digital space (and physical hard drive space) rented and not owned by the client.

Onwards and Upwards to SkynetCloud

Cloud computing, which is gaining dominance in how we deal with data across different fields (such as business, academics, shopping, listening to music, and personal communications), is the essence of a network. The cloud system is capable of linking devices from desktops, laptops, mobile phones, gaming consoles, and tablets and linking them together as a way to store data so that the client can be anywhere in the world and still have access to his or her information without the need to carry a particular device. This does raise a lot of questions and concerns (those in love with the Terminator franchise like I am will be reminded of Skynet without the rampaging, murderous robots…just yet) about security and privacy as the client is essentially handing over data to an outside party who then stores the information on physical computers elsewhere (several, if you remember from the term redundancy, as a way to keep data from being lost due to an accident or hardware malfunction).

Conference Poster for the 2012 South by Southwest Conference.

Archived Conference Poster for the 2012 South by Southwest Conference.

For those who a little wary of placing their personal data in the hands of strangers on a computer they will probably never see, cloud computing may be closer to home than they realize. These systems have become especially prominent in the act of listening to music because a person can buy a song from Amazon or iTunes and listen to it on his or her phone while on the go, or the user can use the digital radio station-esque Pandora and listen to the random song list the program generates and then adapts to the user’s liking or disliking of individual songs (Strickland, “Music Clouds”; Crawford, “Amazon Cloud Player” and “iTunes Cloud”). With iTunes Cloud, users can sync their devices (generally without too much issue) together in order to create backups and share files across devices. Images, music, contact lists, videos, and other media are no longer restricted to just a computer or phone, making it easier for content to be retrieved should something malfunction or need to be replaced (Crawford, “iTunes Cloud”). This has further connection ramifications as such software turns a home into a network as computers can link together not just on internet connections, but also through Home Sharing. In effect, we and our devices both become nodes of connection, linked together through cloud computing systems.

Cloud computing itself has the feel of science-fiction as it allows users all over the world to connect their devices to each other in a closed system where only they have access, or they may extend their reach outwards and participate in larger virtual communities founded on cloud technologies. In a major way, cloud systems are reshaping our relationship to data and data storage as we no longer need to worry about our computer crashing or not having access to documents while on a trip; cloud operators promise us that our data will be there when we need it, wherever we are (unless we are lost on some remote island or stuck in the most remote region of some mountain where cell phone service is non-existent, which is becoming less and less a possibility it seems). Cloud computing is all about interconnections, whether for personal data storage, applications, collaboration, or business efficiency. It allows any device with internet connection to link to whatever cloud computing system the user has access to, and information has become just a few clicks away. This technology, for better or worse, is enhancing the image of the world as a digital network, with us as the nodes and cloud as the connectors.

ENGL894 Asynchronous Activity: How connected are you?


Crawford, Stephanie. “Does ‘to the Cloud’ Mean the Same Thing as ‘Let’s Google That’?” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.

Crawford, Stephanie. “How the Amazon Cloud Player Works.” How Stuff Works? How Stuff Works, 20 Apr. 2011. Web. 17 Jan. 2014.

Crawford, Stephanie. “How the Apple iCloud Works.” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.

Schofield, Jack. “What are Intranets and Extranets?” BBC WebWise. BBC, 09 Sept. 2010. Web. 17 Jan. 2014.

Strickland, Jonathan. “How Cloud Computing Works.” How Stuff Works? How Stuff Works, 08 Apr. 2008. Web. 17 Jan. 2014.

Strickland, Jonathan. “How Grid Computing Works.” How Stuff Works? How Stuff Works, 25 Apr. 2008. Web. 17 Jan. 2014.

Strickland, Jonathan. “How Music Clouds Work.” How Stuff Works? How Stuff Works, 08 Aug. 2011. Web. 17 Jan. 2014.

This entry was posted in ENGL894, Reading Notes and tagged , , , , , , , , , , , , , , , , , , , , , . Bookmark the permalink.

2 Responses to Cloudy with a Chance of Connection

  1. Maury says:

    Interesting reading and awesome summary, Summer! The idea of autonomic computing is so interesting, especially the parallels to the nervous system. There was a piece in my Networking articles that spoke about using whatever device you happen to be closer to (rather than a “personal” device. I linked to it. Your discussion about “renting digital space” made me think of it, because you also may just “rent” devices, too. Rethinking ownership and what you have “control” over is pretty big territory.

  2. Julia says:

    Summer – Interesting use of pop culture as a base set of references to explain both positives and potential negatives of your particular topic. The terminology descriptions are also nicely straightforward.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s