This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
The Clouds Roll By
May-June 2012 (vol. 10 no. 3)
pp. 84-87
Michael Lesk, Rutgers University
Technology changes have driven us first away from centralized computer services and now back toward centralization. Security and reliability are likely to improve as expertise is also centralized and fewer demands are placed on the relatively inexperienced individual users.

1. R.M. Fano, "The MAC System: The Computer Utility Approach," IEEE Spectrum, Jan. 1965, pp. 56–64.
2. P. McFedries, "The Cloud Is the Computer," IEEE Spectrum, Aug. 2008; http://spectrum.ieee.org/computing/hardware the-cloud-is-the-computer.
3. A.L. Goldberg, M. Tondow, and D.D. Bushnell, "The Computer in Education—Some Examples," Proc. IEEE, vol. 54, no. 12, 1966, pp. 1656–1662.
4. J. Anderson and L. Rainie, "The Future of Cloud Computing," Pew Internet,11> Jun. 2010; http://pewinternet.org/Reports/2010The-future-of-cloud-computing.aspx.
5. S.L. Garfinkel, "Computing Pioneer Dies," Technology Rev.,25 Oct. 2011; www.technologyreview.com/computing38977.
6. M. Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, tech. report UCB/EECS-2009-28, Reliable Adaptive Distributed Systems Laboratory, UC Berkeley, Feb. 2009; www.eecs.berkeley.edu/Pubs/TechRpts/2009 EECS-2009-28.pdf.
7. O. Blagoj Popov, Creative and Innovative Network Management, IOS Press, 2003, p. 46.
8. W.D. Nordhaus, "The Progress of Computing," Nat'l Bureau of Economic Research, 2002; http://nordhaus.econ.yale.eduprog_030402_all.pdf.
9. J. McCallum, "CPU Price Performance 1944–2003,"18 Oct. 2003; www.jcmit.comcpu-performance.htm.
10. C. Cerf and V. Navasky, The Experts Speak, Pantheon, 1984, pp. 203–209.
11. D. Molnar and S. Schechter, "Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud," Proc. 9th Workshop Economics of Information Security (WEIS 10), Microsoft Research, 8 June 2010; http://research.microsoft.com/apps/pubsdefault.aspx?id=132318.
12. M. Cooney, "US Cyber Chief Says Cloud Computing Can Manage Serious Cyber Threats," Network World,7 Nov. 2011; www.networkworld.com/news/2011110711-cyberchief-cyberthreats-252844.html.
13. R. Mayo and C. Peng, "Cloud Computing Payback," IBM, Nov. 2009; ftp://public.dhe.ibm.com/common/ssi/sa/wh/ n/diw03009usenDIW03009USEN.pdf.
14. T. Clark, "Quantifying the Benefits of the RightScale Cloud Management Platform," FactPoint Group, 2010; www.rightscale.com/info_center/white-papers RightScale-Quantifying-The-Benefits.pdf.
15. D. Rosenthal, "Cloud Storage Pricing History,"17 Feb. 2012; http://blog.dshr.org/2012/02cloud-storage-pricing-history.html.

Index Terms:
cloud computing, utilities
Citation:
Michael Lesk, "The Clouds Roll By," IEEE Security & Privacy, vol. 10, no. 3, pp. 84-87, May-June 2012, doi:10.1109/MSP.2012.81
Usage of this product signifies your acceptance of the Terms of Use.