Developing Technology in the Cloud: An Informed Perspective

Part 2:

In my first post, I mentioned the developer utilizing cloud toolsets and in safe cloud landing zones and sandboxes for testing code and applications. Kubernetes containers can be pushed to legacy systems with cloud-native applications in this varied toolset. The toolset is varied as we are always moving from a previous or current state of our systems to a future state and we are in this “bridge” of technology development. The pace of innovation will continue, and we always be in this bridge technological development and various microservices, libraries are trying to bundle things easier for the developer communities.

Historically, the sheer lack of Java programmers led Yahoo to create the language Pig, as “pigs eat everything” meaning it was capable of digesting various generic code from a variety of programming languages. Google’s Big Table gave rise to the distributed parallel computing in managing Big Data. Pig and R are quickly be eclipsed by Python due to open source communities and development. The Open Source world is starting to give rise to the need for standardization, trust and transparency where fellow coders can contribute, augment and customize the software code as one sees fit. Cloud enables faster deployment and scale, but it is interesting to look behind the cloud and what people are doing collectively in software with the cloud.

In my conversations with developers, they want to see what is in the code, not black box development and make changes or utilize portions of it. The open source developer community is giving rise to an “un-patent” world where true innovation is a community concern and growth and utilization of software (and hardware as well) through freemiums and value-based pricing is the new frontier of technology innovation and collaboration. This is evidenced through Microsoft buying Github. IBM is also a leader in blockchain with its hyper ledger fabric in an open source fashion where again, easy to experiment and iterate with use cases. 

It’s interesting to note the hardware space is moving to open source, as BMW opened up its patents as well as Toyota with its hybrid technologies as they are well aware this is connected software and hardware play.  The transparency in open source allows helps bolster security by allowing the community to contribute and incrementally getting more secure. You can think of both strengths and weaknesses in a black box environment are guarded, but we simply do not know. The value in an open source version with regards to security is it has more possibilities to be explored, examined and tested

IBM’s fully-certified, managed Kubernetes Service enables you to help your clients rapidly delivery their applications, while having the option of tapping into IBM’s comprehensive and intelligent cloud services, like AI, for added value and can be seen here and try thousands in free cloud credits here.Through an intuitive user interface, the IBM Cloud Kubernetes Service works by creating a cluster of compute hosts and deploys highly available containers. This cluster lets you securely manage the resources that you need to quickly deploy, update and scale applications with complete control.