What is cloud computing?

"The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software including operating systems and applications." Examples include Amazon's EC2 cloud platform.

Businesses may well be using some, or all, of these services already. Hosted Microsoft Exchange email or hosted SharePoint services, Google's Docs product and software as a service applications - of which Salesforce.com is perhaps the best known - show the range of services on offer through the cloud.

Increasingly, cloud computing is being used as a byword for bought-in IT services that stop short of full outsourcing deals, involving long-term contracts and the transfer of equipment or staff.

In practice, cloud computing can be defined as technology including software and hardware that is owned by others, run remotely from the end-user business, and paid for through a flexible contract.

That pricing model could either be a subscription, per user, per month, or a form of pricing based on IT capacity or even transactions. Consumer services such as Mozy, an online backup service, have already set an example for this, by charging end users per gigabyte of storage they rent.

The cloud in practice

Inevitably, definitions will star to blur, as businesses, and vendors, put the emerging infrastructure to new uses. One business might well use a cloud service to provide a service, in turn, to others; there are already examples of companies building suites of hosted applications, using cloud technologies, for vertical markets such as law firms or estate agency.

At the other end of the spectrum, large enterprises and public sector bodies are going about creating their own, private versions of cloud computing. These use many of the same technology building blocks as public clouds, and even some of the same economic models, through internal charge-back mechanisms.

By putting cloud computing infrastructure behind the firewall and within the control of the IT department, some of the difficulties around security, privacy and data ownership are overcome.