The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2012 vol.10)
pp: 84-87
Michael Lesk , Rutgers University
ABSTRACT
Technology changes have driven us first away from centralized computer services and now back toward centralization. Security and reliability are likely to improve as expertise is also centralized and fewer demands are placed on the relatively inexperienced individual users.
INDEX TERMS
cloud computing, utilities
CITATION
Michael Lesk, "The Clouds Roll By", IEEE Security & Privacy, vol.10, no. 3, pp. 84-87, May-June 2012, doi:10.1109/MSP.2012.81
REFERENCES
1. R.M. Fano, "The MAC System: The Computer Utility Approach," IEEE Spectrum, Jan. 1965, pp. 56–64.
2. P. McFedries, "The Cloud Is the Computer," IEEE Spectrum, Aug. 2008; http://spectrum.ieee.org/computing/hardware the-cloud-is-the-computer.
3. A.L. Goldberg, M. Tondow, and D.D. Bushnell, "The Computer in Education—Some Examples," Proc. IEEE, vol. 54, no. 12, 1966, pp. 1656–1662.
4. J. Anderson and L. Rainie, "The Future of Cloud Computing," Pew Internet,11> Jun. 2010; http://pewinternet.org/Reports/2010The-future-of-cloud-computing.aspx.
5. S.L. Garfinkel, "Computing Pioneer Dies," Technology Rev.,25 Oct. 2011; www.technologyreview.com/computing38977.
6. M. Armbrust et al., Above the Clouds: A Berkeley View of Cloud Computing, tech. report UCB/EECS-2009-28, Reliable Adaptive Distributed Systems Laboratory, UC Berkeley, Feb. 2009; www.eecs.berkeley.edu/Pubs/TechRpts/2009 EECS-2009-28.pdf.
7. O. Blagoj Popov, Creative and Innovative Network Management, IOS Press, 2003, p. 46.
8. W.D. Nordhaus, "The Progress of Computing," Nat'l Bureau of Economic Research, 2002; http://nordhaus.econ.yale.eduprog_030402_all.pdf.
9. J. McCallum, "CPU Price Performance 1944–2003,"18 Oct. 2003; www.jcmit.comcpu-performance.htm.
10. C. Cerf and V. Navasky, The Experts Speak, Pantheon, 1984, pp. 203–209.
11. D. Molnar and S. Schechter, "Self Hosting vs. Cloud Hosting: Accounting for the Security Impact of Hosting in the Cloud," Proc. 9th Workshop Economics of Information Security (WEIS 10), Microsoft Research, 8 June 2010; http://research.microsoft.com/apps/pubsdefault.aspx?id=132318.
12. M. Cooney, "US Cyber Chief Says Cloud Computing Can Manage Serious Cyber Threats," Network World,7 Nov. 2011; www.networkworld.com/news/2011110711-cyberchief-cyberthreats-252844.html.
13. R. Mayo and C. Peng, "Cloud Computing Payback," IBM, Nov. 2009; ftp://public.dhe.ibm.com/common/ssi/sa/wh/ n/diw03009usenDIW03009USEN.pdf.
14. T. Clark, "Quantifying the Benefits of the RightScale Cloud Management Platform," FactPoint Group, 2010; www.rightscale.com/info_center/white-papers RightScale-Quantifying-The-Benefits.pdf.
15. D. Rosenthal, "Cloud Storage Pricing History,"17 Feb. 2012; http://blog.dshr.org/2012/02cloud-storage-pricing-history.html.
36 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool