Introduction: Shadowless cloud computer provides computing power at your fingertips, and constructs a secure office on the cloud in scenarios such as cloud office, foreign company office, branch office, software development, and human outsourcing.
On December 21, 2021, Ali Cloud Elastic Computing Annual Summit was officially held in Shanghai, and it was broadcast live in full view. At the summit, Liu Qiang, director of Intelligent Shadowless products of Ali Cloud, delivered a speech with the theme of “Shadowless: Connecting computing power at your fingertips to Build a secure office on the cloud”, explaining in detail the product advantages of Shadowless computer and how to empower corporate office.
Photo: Liu Qiang, intelligent shadowless product director of Ali Cloud
01 Easily accessible computing power to meet the needs of enterprise customers in an all-round way
Only an organic fusion of cloud and end can create the computing power at your fingertips. The computing power of the cloud is like the sunny side of Tai Chi, while that of the cloud computer is the dark side of Tai Chi. The computing power of the cloud and the terminal are very similar and complementary.
The cloud and the end have the same market scale of hundreds of billions, both in the IT industry, the same business model, but because cloud server access is command line access mode, low frequency interaction scenario, cloud computer scene is high frequency strong interaction scenario, so the development of cloud computer is very restricted by network conditions.
The cloud side of the technology continues to evolve, culminating in a qualitative leap forward by 2020, breaking down the major constraints that have held back the development of cloud computing.
In 2020, COVID-19 swept the world, and the emergence of the epidemic boosted people’s recognition of cloud business. Many people attended cloud classes and teaching, and more or less used a variety of cloud services during the quarantine period. The epidemic educated potential customers of cloud and made people more identify with the concept of cloud computing.
In addition, cloud computing has accumulated scale effect after eleven years of development. The development of cloud computing can amortize the development cost of cloud computers, so that the price of cloud computers is almost the same as that of cloud PCS, which is the development of cloud.
At the network level, large-scale construction of 5G will begin in 2020. In the future, if cloud computers further develop into the field of edge computing, that is, MEC node, network delay will be further optimized. By then, there will be no difference between the use of local computers and cloud computers, and all scenes can be run on the cloud.
Cloud and the net change, making terminal count force can become smaller and smaller, a large number of work force moved to the cloud, the terminal can also use a very flexible for all kinds of display, such as machine, card machine, folding screen, you can even put the cloud computer integrated into the mouse, keyboard, display, VR glasses, camera, etc., can be integrated into a lot of places, Cloud computing will be presented in a multi-terminal way, forming a new computing architecture, a new form of computing.
Muying product and elastic computing are twin products, so Muying Cloud computer naturally has the strong potential energy of Ali Cloud and has super complementary advantages. On the cloud, the cloud server is often the production link, and the cloud computer is the RESEARCH and development link, and the research and development and production can be linked, so that we can master the ability to open up the industrial ecology and cross marketing, and it is also a complementary scene.
Such as complementary price advantage comes from the cloud, the cloud server to run a lot of business, including live and social entertainment business, mostly in the evening, the working class and cloud computer is mainly business, mainly in the daytime, so you can use to calculate peak force, uplink and downlink bandwidth at the same time also has formed the good complementary, Such complementary capabilities ultimately give cloud computers a big advantage.
In addition, the cloud is a base product, without a shadow of cloud computer is built in the application layer on the cloud server products, which means that as long as is the place where the cloud server deployment can deploy shadowless cloud computer, so no shadow cloud computer at the time of the newborn has the advantage of scale, ali cloud computing, storage, network all over the world, is not only the elastic calculation, also no shadow, This allows users to access unlimited computing power anytime, anywhere.
How does computing power get delivered to the end user? We mainly deliver through flexible terminals, including soft terminals, hard terminals, card machines, all-in-one machines and other terminal equipment, making ubiquitous computing power within reach. For personal IT office needs, cross-screen, cross-application, cross-operating system collaboration is the best convenient embodiment.
The computing power of the terminal is limited, while that of the cloud is infinite. There can be either CPU or GPU. Therefore, the computing power that cannot be completed on the terminal can be carried out on the cloud, which brings greater imagination to the terminal. Computer clusters can also be built in the cloud, where students can run experimental classes. This is a scenario that the cloud can realize but the terminal computing power cannot reach.
For enterprises, convenience and safety is also a top priority. Safe and convenient productivity is the core value for the enterprise, cloud office, foreign enterprises, research and development, design and other scenarios can be met by shadowless product form.
The flexibility is that it can be applied on tablets, on phones, and even on computers, across operating systems and platforms, anytime, anywhere. That’s the value of the application products.
These product forms depend on the corresponding product capabilities, which are rooted in the computing, storage, network, security and other product capabilities provided by Ali Cloud. These product capabilities are summarized and packaged by the functional modules of Wuying products to form Wuying product capabilities. In addition, there are a variety of delivery modes, such as public cloud, private cloud, cloud box, local cloud, etc., which can meet the business requirements of different types of customers.
02 Shadowless cloud computer security office five application scenarios
With the development of enterprise office and Internet business, more and more scenarios need to use cloud computers to solve different problems. In the process of serving customers, the advantages of shadowless cloud computers are also maximized, enabling enterprises or individual customers to achieve efficient and safe office.
1. Cloud office scenario
More and more enterprises, their customers, systems and even employees work together through the Internet. At the same time, many companies adopt the crowd-sourcing mode of work. This convenient and advanced working mode brings low labor costs for enterprises, but it also brings many problems.
In 2021, the Law on the Protection of Personal Information Security was introduced. Personal privacy leakage has become such a serious problem that employees may steal data and their bosses may be held legally liable, which puts forward a higher demand for security. In such a situation, shadowless solutions can ensure that data does not fall into disk and protect the security of remote office data. Because a lot of data does not fall into the local, employees only remotely access the office on the cloud, and the data can be protected more securely.
2, the foreign office scene
Many foreign companies in China are asset-light operation mode, and cloud can just meet the demand of asset-light, and foreign companies are more strict supervision, process is more standardized, the information security requirements are higher, cloud computers can solve zero trust and other security solutions, to ensure data security.
Cross-border network at the same time, foreign companies have many multinationals need to get through, this is a cloud network’s ability to get through, and through the cloud computer access to the data itself is not trading, data cannot kao, can only see can’t copy, computer can also be equipped with security monitoring software and cloud, is advantageous to the unified management, can provide very safe service.
3. Branch office scenarios
Because the branches of domestic enterprises, its connectivity is only the demand of domestic connectivity, foreign enterprises often need to do transnational data connectivity needs. In this case, an on-cloud office can be built on the cloud, and a dedicated line can be connected to the headquarters to realize cross-border data connectivity.
In different application scenarios, the multi-region deployment allows different organizations to access the system through the Internet, VIRTUAL private network (VPN), and private lines, ensuring desktop experience.
4. Software development scenarios
The core value of cloud computers in software development scenarios is to protect data codes from the problems that traditional software may encounter, such as code leakage. With the advent of the era of mobile Internet, a powerful and convenient public cloud service is needed to ensure that the upstream and downstream of employees or suppliers can access the existing system anytime and anywhere, which is what cloud computers are good at. Complex authentication logic is also required, as scenarios become more complex and zero-trust schemes become necessary.
Shadowless cloud desktop console and Ali cloud desktop console are also being combined effectively, which can make cloud computers have good elastic scalability. In the past, cloud native is the cloud native of the service side. After cloud computer is added, the whole full-stack cloud native can be formed. The r&d environment of the client side can be integrated into the cloud native environment, which can effectively realize the closed-loop of the whole cloud native environment.
5. Human outsourcing scenario
Conventional separation shore and in the package outside, outsourcing in otc package management is relatively easy, offshore outsourcing if the office in the outsourcing company, some complicated network, the IP devices connected to it is more complex, the way a cloud computer will ensure that data security, data do not fall to the ground, also can do security audit practice, to better guarantee the security of data.
To sum up, through no shadow to connect the computing power at your fingertips, to build a secure office on the cloud, to achieve the success of the enterprise, Ali Cloud believes that in the future can achieve higher and wider dimension integration, continuous growth and innovation, for the global enterprise cloud office to provide a solid force.
The original link
This article is the original content of Aliyun and shall not be reproduced without permission.