Google gets serious about cloud with sole-tenant nodes

Cloud giant catches up with Microsoft and AWS in launching dedicated architecture for firms

Apps displayed on an Android OS smartphone

Google has announced the beta rollout of its sole-tenant nodes in Google Compute Engine, allowing businesses to run instances on their own dedicated architecture rather than having to share the host with others.

However, just because a node is only used by one business, that doesn't mean it's harder for the firm to set up and manage itself. To solve this issue, Google's sole-tenant nodes use an algorithm to automatically find the best location to launch the instance. They're also better at dealing with outages during maintenance, with instances migrated automatically to avoid downtime, according to the cloud giant.

Google claimed the pricing structure is also highly competitive because businesses only need to pay for what they use. Access is charged on a per-second basis, with a one minute minimum charge.

The cloud giant said its sole-tenant nodes will be particularly attractive for highly regulated industries that need to separate their compute resources in the cloud for compliance reasons. They can be used hand-in-hand with virtual machines to offer a flexible, but secure service.

Businesses that aren't so highly regulated can use these nodes to choose where they want their instances to run using user-defined labels or choosing to have Google select their locations instead.

Google's sole-tenant nodes are pretty similar to Amazon Web Services' EC2 Dedicated Hosts, which also gives users keys to their own virtual kingdom, so customers can create multiple instances on physical hardware if they wish. It also appears to be similar to Microsoft's single-tenanted infrastructure, suggesting Google is a little behind its rivals in launching such an offering.

Picture: Bigstock

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

Most CISOs worry cloud software flaws aren’t being caught
cloud security

Most CISOs worry cloud software flaws aren’t being caught

7 Jun 2021
Cloudera to acquire Datacoral and Cazena before going through its own acquisition
Acquisition

Cloudera to acquire Datacoral and Cazena before going through its own acquisition

1 Jun 2021
VMware and Nvidia working to enable next-gen hybrid cloud architecture
VMware

VMware and Nvidia working to enable next-gen hybrid cloud architecture

29 Sep 2020
Microsoft Azure Digital Twins previews new features
Cloud

Microsoft Azure Digital Twins previews new features

30 Jun 2020

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
Q&A: Enabling transformation
Sponsored

Q&A: Enabling transformation

10 Jun 2021
What is HTTP error 400 and how do you fix it?
Network & Internet

What is HTTP error 400 and how do you fix it?

16 Jun 2021