U.S., Chinese, EU firms push cloud standards
Open Data Center Alliance, with 280 members, claims to represent $100 billion in IT spending power
Computerworld - A group of U.S. and overseas companies, including some major Chinese firms, are betting that they can encourage cloud providers to adopt common standards for managing security, operating routine processes and describing their services.
Whether cloud vendors adopt the Open Data Center Alliance standards released Tuesday remains to be seen.
But the 280 members of this alliance have a big -- and growing -- stick. The group claims that its members have $100 billion in annual IT spending power, and will spend part of it with cloud vendors that pay attention to the their work.
Open Data Center Alliance members include BMW, USB, Deutsche Bank, JPMorgan Chase, Marriott International, Shell, and Disney Internet Labs. Overseas companies with seats on the alliance's steering committee include China Life, a Beijing-based insurance company, and China Unicom, a government owned telecommunications company.
The alliance was formed last year to work on standards for cloud vendors that address many of the issues that, at the minimum, bug users, and at worst, keep them from adopting cloud technologies.
The first set of "usage models," released today, aims among other things to fix problems caused by the lack of an agreed upon method for creating and stopping virtual machines.
"How you start, stop, create, suspend a VM really shouldn't be a selling point for (cloud vendors)," said Andrew Feig, the executive director of financial services firm UBS's Technology Advisory Group and an alliance board member. "However, it does cause us a lot of pain to actually have to do that four different ways for four different vendors."
The six- to 10-page usage models are designed to give succinct guidance to cloud providers about security and operations. At the same time, the alliance is working with standards bodies to determine whether the usage models can provide a foundation for future standards.
"They shouldn't be ridiculously hard to implement; they should be very pragmatic and very straight forward to the provider," Feig said.
Security is a major focus for the alliance, and the usage models set four levels: Bronze, for basic security; silver, a level that reaches enterprise security requirements; gold, a security level that meets financial industry needs; and platinum, a military-level equivalent.
The security requirements aim to ensure that systems are "tamperproof," and protected, for instance, from spoofing. They also set rules to ensure dedicated capabilities around shared resources. The plan also includes rules for managing cryptographic keys, patches and software versions.
Requests for proposals from alliance members will require adherence to the usage models -- that's the carrot.
"Hopefully, it will get the industry moving a little quicker in this space," said Feig.
Other models set standard units of measure to make it easier to compare services.
If a customer is buying a server, for instance, the alliance standards offer clear definitions and metrics for comparing servers. "Things have been standardized," said Feig. Today, he noted, users are buying services whose descriptions "come out of left field for every provider."
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov, or subscribe to Patrick's RSS feed . His e-mail address is firstname.lastname@example.org.
- Enterprises increasingly look to the private cloud
- Without the cloud, Microsoft may lose grasp on the enterprise
- How the cloud can make IT shops more innovative
- Business users bypass IT and go rogue to the cloud
- HP looks to ease enterprise IT cloud fears
- Afraid of the cloud? How to handle your fears
- 5 reasons why Google can catch Amazon in the cloud
- Public cloud market ready for 'hypergrowth' period
- Cloud security concerns are overblown, experts say
- Cloud computing 2014: Moving to a zero-trust security model
Read more about Cloud Computing in Computerworld's Cloud Computing Topic Center.
- What is this "File Sync" Thing and Why Should I Care About It? All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no...
- The Truth About Cloud Security "Security" is the number one issue holding business leaders back from the cloud. But does the reality match the perception?
- Transform IT: Transform the Enterprise This paper provides IT leaders with insight into three IT imperatives that 24 CIOs and senior IT executives used to reposition IT and...
- Case Study Adopting ITSM Tech to Support ITIL Initiatives CIO Bart Murphy Improves Service Delivery while Lowering Costs by consolidating services across 6 business units.
- Why Are Customers Really Deploying an NGFW? It seems every IT Security expert is talking about the NGFW, but what are people really doing? This webcast covers 5 real-world customer...
- ElectricAccelerator: Dramatically Faster Builds and Test ElectricAccelerator dramatically speeds up builds and test by parallelizing jobs across clusters of physical or cloud CPUs. All Cloud Computing White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!