Menu Close

Cloud Computing Origins

"I don't need a hard disk in my computer if I can get to the server faster...carrying around these non-connected computers is byzantine by comparison." Steve Jobs

The Origins of Cloud Computing

The internet is a global network of computers, aka the cloud

We get the imagery, but there is nothing celestial about it.  In reality it means using very terrestrial hardware and software of remote third party providers, versus your own local infrastructure.  The trend is one-way only, more cloud.  It’s a significant endeavour for any corporation to undertake and there are many compelling reasons to do so.

But let us first put your up-coming cloud migration into context.  We’ll go back in time for you to realise how quickly technology has evolved, and how companies & households have embraced it.

Cloud services are the logical conclusion of a 20th Century telecoms revolution

It all started with early wire-based telegraphs & telephones when science turned sound into electronic form.  Telephony followed an evolution that remained wire-based all the way until the commercialisation of mobile phones.  On the other hand, wireless audio (radio) and visual (tv) communication followed a separate evolutionary path.

The magic happened when turning sounds & images into radiation

The word radiation comes from the Latin word ‘radius’ or beam.  Electro-magnetic radiation soon was commonly called a radio wave, transmitting audio & visual content through the air in two forms, analogue and digital, between emitters and receiving towers & aerials.  Combined with the massive landline systems of telephone companies feeding into corporations and households, wire-based infrastructure was adapted to deliver internet access via ADSL and broadband.  Computers have become digital telephone & tv systems using Internet Protocol (IP), and the internet itself is a global network of computers, aka the cloud.

Our Memo provides further insight.


On Key

Related Posts



Imagine you own a house and want to add an additional floor. First you have to review and strengthen the foundations. This service builds cybersecurity foundations to facilitate growth in a resilient, timely manner.

This service will also provide the company with a cybersecurity risk assessment and improvement plan but with significantly more support from a senior consultant to help the company embed improvements in a continuous, timely manner


The dreaded car MOT is looming. It’s the unforeseen wear & tear that results in some necessary annual maintenance. Our cybersecurity review will highlight what needs to be done as your engineers.

In addition to the context gathering stage and security footprinting service, a senior consultant will perform a risk assessment to understand the company’s cyber risks and provide recommendations. They will also be available to undertake monthly calls for answering questions, providing guidance and checking on whether risks are reducing.


You’re embarking on a more active lifestyle, chosen to go on a diet and get in shape. Think of this service as the cybersecurity equivalent of the personal trainer, helping you along the way.

After an initial context gathering stage, a junior security consultant will be available once per month to answer questions and provide recommendations based on company goals and activities. A cybersecurity footprinting service will allow the company to continuously monitor its external security posture.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Add Your Heading Text Here

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.