{"id":283,"date":"2010-08-08T00:00:00","date_gmt":"2010-08-08T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/08\/whatever-the-numbers-cloud-growth-is-skyrocketing\/"},"modified":"2021-12-30T11:36:54","modified_gmt":"2021-12-30T11:36:54","slug":"whatever-the-numbers-cloud-growth-is-skyrocketing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/08\/08\/whatever-the-numbers-cloud-growth-is-skyrocketing\/","title":{"rendered":"Whatever the Numbers, Cloud Growth is Skyrocketing"},"content":{"rendered":"<p>A UBS research report sparked a lot of discussion this week with its estimate that Amazon Web Services&#8217; total revenue will top $500 million this year and $1.1 billion by 2014.  Even if the numerical estimates aren&#8217;t entirely quantifiable, stated growth from other cloud providers suggests UBS&#8217;s estimated growth curve for AWS is probably accurate.  This week, for example, RightScale announced a 1,000 percent customer spending increase from June 2009 through June 2010.  Aside from consistent cloud-based revenue growth, its cloud customer count almost doubled between the first quarters of 2009 and 2010 &#8212; from 43,030 to 80,080.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Guy Rosen, who does a quarterly calculation of the top 500,000 web sites hosted on cloud platforms, also has tracked impressive growth.<\/p>\n<p>As of Aug. 2010, his research shows 3,011 sites hosted on Amazon EC2, and 2,825 hosted on Rackspace Cloud Servers.<\/p>\n<p>It&#8217;s easy to get lost in the exact numbers, but the constant growth tells the story: Cloud computing (of the externally hosted variety) is growing at a breakneck speed, and AWS appears to have the lion&#8217;s share of the market.<\/p>\n<p>Yes, the present revenue numbers are low compared with traditional IT, but the sky is the limit for cloud stakeholders.<\/p>\n<p>http:\/\/gigaom.com\/2010\/08\/08\/whatever-the-numbers-cloud-growth-is-skyrocketing\/<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-283","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=283"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/283\/revisions"}],"predecessor-version":[{"id":2770,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/283\/revisions\/2770"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}