Does the rest of the cloud computing world really need to clone Amazon Web Services in order to succeed?
Probably not, says Lew Moorman, the president of Rackspace, the San Antonio, Texas, company that plays second fiddle to Amazon in the cloud game. According to him, some customers want companies like his to clone all of Amazon’s Application Programming Interfaces, the coding standards that let a program interact with Amazon’s cloud. But he thinks it’s a bad idea that isn’t going to work out.
It's safe to say that you receive many solicitations from vendors of every stripe hawking their new cloud services: software, storage, apps, hosted this, managed that. "Simplify your life! Reduce your burden! It's a floor wax and a dessert topping!" Some of these services deliver as promised, within fairly strict boundaries, though some are not what they seem. Even more have a look and feel that can make you swoon, but once you start to peer under the covers, the specter of integrating the service with your infrastructure stares back at you and steals your soul.
After years of battling Linux as a competitive threat, Microsoft is now offering Linux-based operating systems on its Windows Azure cloud service.
The Linux services will go live on Azure at 4 a.m. EDT on Thursday. At that time, the Azure portal will offer a number of Linux distributions, including Suse Linux Enterprise Server 11 SP2, OpenSuse 12.01, CentOS 6.2 and Canonical Ubuntu 12.04. Azure users will be able to choose and deploy a Linux distribution from the Microsoft Windows Azure Image Gallery and be charged on an hourly pay-as-you-go basis.
Oracle CEO Larry Ellison appears to have a healthy respect for Amazon Web Services. Why? It’s one of the few rivals he didn’t rant about.
And if imitation is flattery, it’s quite possible that Ellison is an AWS fan. Consider the following quote from Oracle’s cloud powwow.
A flaw in Google's account-recovery process has resulted in CloudFlare CEO Matthew Prince losing control of his Google Apps for Business account, despite it being protected with two-factor authentication.