2011 Cloud Computing Predictions

2011 Cloud Computing Predictions

In 2010, we have seen a transformation of skeptics from their belief that cloud computing is suited mainly for small to mid-sized business, to a general acceptance that “the cloud” is everywhere. However, we have also seen a lot of inconsistency in how to differentiate cloud-based computing from on-premise computing. As a result, there has been confusion created in the market as software vendors like Microsoft promote their cloud offerings, and CIOs of large companies claim that their private cloud has been in place for years.

As I take a macro look at the industry today, it is clear that 2011 will continue a trend toward the convergence of the consumer and the enterprise web. Historically, the enterprise web has lagged the functionality and scalability of the consumer web because of several factors — the most significant of which are application complexity and the need for robust data security.  Today, the capabilities of the public cloud make the support of enterprise applications routine, and we see evidence of it being implemented every day.  With that said, there are changes in the ecosystem that will impact the speed to adoption among large enterprises.

What’s to Come for the Cloud

Large consultancies (e.g. Accenture, Deloitte) will continue to push private cloud and have minimal success with the public cloud

There is an almost religious debate brewing among cloud purists that recognize the difference between service-oriented architecture (SOA) and a true software-as-a-service (SaaS) solution.

Large organizations have been much more accepting of SOA-based solutions that reside entirely within their own firewall. This type of service has been branded as the private cloud and has gained a lot of traction among the Fortune 500.

Why are many in the Fortune 500 slow to adopt the public cloud? The answer has to do with risk tolerance. CIOs have taken notice of the cloud computing (e.g. SaaS, PaaS, IaaS) benefits, however, they have accountability for their actions and as much as they want to demonstrate that they have a cloud strategy, they are still concerned about allowing their data to reside outside of their firewall and relying on a service that is “out of their control.” The notion of the private cloud has been a nice entry point that allows them to answer to their boards, but they are still not realizing the real benefits of the public cloud. By definition, cloud-based systems are public; if you have a cloud in your own data center, check your servers because something is burning!

The big services organizations that serve the Fortune 500 will continue to push the private cloud because it serves the interests of their customers, but beyond 2011 we will see a shift as the market continues to evolve.

User demand for access to cloud-based content and applications whether on a PC, laptop, tablet or smart phone will grow

The ability to access applications through a browser is powerful in terms of maintenance and deployment. However, a side effect is that there is parity among these hardware devices as long as they support a browser that can run the applications. And in the end, the employee benefits by being able to choose the device that optimizes their experience.

The interesting note about this prediction is that hardware manufacturers will drive much of the change. The iPad, iPhone and Android devices have exploded in the market and are quickly capturing the attention of the business community. In my own experience, I have seen several companies buy pallets of these devices, and only then start asking questions about how they can re-architect their enterprise solutions in the cloud to optimize their use. It is truly a case where the intuition of IT groups and business decision makers tells them that these new devices are game-changing, and they are willing to figure out how they will benefit after they have made the purchase!

Adobe AIR will gain recognition as a leading cross platform mobile technology

We’ve seen the acceptance of AIR across many standard devices, and that continues today as Adobe has tipped their hand about additional OS support for Android and BlackBerry. The momentum around cloud services is not all about shared infrastructure, but also the ability for these systems to support a rich, flexible user experience that surpasses that of Windows-based solutions.

More recently, Adobe has stressed the importance of adoption on non-traditional devices such as televisions, smart phones and set top boxes. Adobe AIR (version 2.5) brings this cross-platform vision into your home. Now the only remaining battleground is the border war between Apple and Adobe. In 2011, the momentum of Adobe will require that we finally see the light at the end of the proverbial tunnel when it comes to the long-running conflicts between these two organizations…somehow.

Amazon Web Services will continue to innovate to become more enterprise friendly and gain traction within large corporations… Continue Reading

By John Barnes, CTO of Model Metrics /VMBlog

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Get Ready For Virtual Reality and the Cloud

Get Ready For Virtual Reality and the Cloud

Virtual Reality Cloud We’re lucky to live in an era where virtual reality is no longer relegated to the confines of a sci-fi movie universe. Thanks to technology introduced by products like Oculus Rift, consumers now have access to virtual environments with fully immersive graphic capabilities. As a result, companies have only just begun to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Cloud Infographic: The Explosive Growth Of The Cloud

Cloud Infographic: The Explosive Growth Of The Cloud

The Explosive Growth Of The Cloud We’ve been covering cloud computing extensively over the past number of years on CloudTweaks and have truly enjoyed watching the adoption and growth of it. Many novices are still trying to wrap their mind around what the cloud it is and what it does, while others such as thought…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Expert Insights Into The Yahoo Breach

Expert Insights Into The Yahoo Breach

Yahoo Breach Latest reports suggest that the recent Yahoo! data breach may exceed 500 million records, with some sources implying millions more records penetrated, upping the total number of records stolen in various recent hacks to approximately 3.5 billion. CloudTweaks spoke to Kevin O’Brien, CEO of GreatHorn, for expert insight into this latest violation. GreatHorn…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…