Quick Bio and Disclaimer
Among other things, Craig Lowery is an IT industry analyst at Gartner Inc., covering cloud computing topics such as managed cloud services, cloud cost management, and platform as a service. Before that, he was a Senior Distinguished Engineer and the Executive Director of Cloud Architecture in the Dell Software Group at Dell Inc. focusing on cloud computing, with special emphasis on workload mobility and hybrid cloud.
This site is a personal endeavor representing his own views and observations about whatever seems to be interesting at the moment. Opinions and views expressed here are not necessarily those of Gartner Inc.
Category Archives: Cloud Computing Technology Insights
Part 3 – PaaS: A Spectrum of Services In my previous post, I started developing the notion of a “universal” cloud service model that has IaaS is at one end and SaaS at the other of a spectrum. But spectrum of what? I … Continue reading
Part 2 – A Universal Service Model In my previous post, I introduced the idea that all cloud services are “platform as a service,” especially when we think of the entire Internet as the platform, and the various services available … Continue reading
Part 1: IaaS != Entrée Most discussions aimed at answering the question “What is cloud computing?” start with the three service models as defined by NIST: IaaS, PaaS, and SaaS. At this point, I won’t offend you by assuming you need … Continue reading
Part 2 – How Privacy Could Cripple the Cloud Security and privacy are often mentioned together. This is natural, because they are related, yet distinct topics. Security is a technical concept concerned with the controlled access, protection, integrity, and availability … Continue reading
Part 1 – Privacy Ain’t the Same As Security Most people consider the word privacy solely in the context of cloud deployment models, where a private cloud is one reserved strictly for the use of a specific group of people that have … Continue reading
I’ve long wanted more automation and remote control over my house, but until recently such wasn’t possible without a lot of special project boards, wiring, gaps in functionality and – most importantly – time. Now, with the Internet of Things … Continue reading
Part 3 – Leaping the Chasm In my previous posts (Part 1, Part 2) in this series, we established the theory that the human species has come to rely on physical ownership and control of something as necessary and sometimes even sufficient … Continue reading
Part 2 – Distributing the Security Perimeter In part 1 of this series, we examined the fallacy that physical ownership and control of hardware, combined with multi-layered perimeter defense strategies, leads to the most secure IT deployments. In the hyper-connected cloud era, … Continue reading
Part 1 – The False Sense of Physical Security As is often the case when new paradigms are advanced, cloud computing as a viable method for sourcing information technology resources has met with many criticisms, ranging from doubts about the … Continue reading