Where Is Cloud Computing Going? Up, Up And Away!

Where Is Cloud Computing Going? Up, Up And Away!

“An invasion of armies can be resisted, but not an idea whose time has come.”
– Victor Hugo (1802-1885), celebrated French author.

Going by recent reports, cloud computing is indeed an idea “whose time has come.” First, the figures.

According to a report published by market research firm In-Stat, by 2014, businesses in the United States will spend more than $13 billion on cloud computing and managed hosting services. This is in comparison to a trifling $3 billion at present. SaaS (Software as a Service) spending is expected to grow 112 percent annually from 2011 to 2014, while spending on PaaS (Platform as a Service) will increase 113 percent annually to approximately $460 million in 2014. IaaS (infrastructure as a Service) spending will approach $4 billion in the same time frame.



In-Stat is a Arizona-based market research firm that uses “technical, market and end-user research and database models to analyze the Mobile Internet and Digital Entertainment ecosystems.” The company also has offices in Massachusetts and China. The report is part of the firm’s Cloud Computing and Managed Services Spending Forecasts service where five-year spending forecasts are compiled into data sets that end-users can obtain in customised form, allowing them to track the specific topics, trends and issues that affect their business operations.

Although the above figures may seem overly optimistic, they do tie in with numbers released in a Market Monitor report published by the 451 Group late last year. The report predicted that  total cloud computing revenues would touch $16.7 billion by 2015.

In a previous article (How Small Firms Can Benefit Big From Cloud Computing (And Why They Are Not), I had looked at the immense benefits SMEs (Small and Medium Enterprises) can obtain from cloud computing, and also the issues holding back its widespread adoption. According to the aforementioned In-Stat report, these issues are likely to be solved by 2014, considering that it predicts that small and home offices comprised of one to four employees will lead the adoption of cloud computing over the next three years.

Although spending across all sectors and size of business is projected to grow, there are some segments where growth will be staggering,” said Greg Potter, research analyst at In-Stat. “The professional services and healthcare verticals will see the largest growth in spending on cloud computing services, growing over 124 percent between 2010 and 2014.”

The report, titled US Business Spending by Size of Business and Vertical, 2009–2014: Cloud Computing and Managed Hosting Services, provides forecasts of US business cloud computing and managed hosting spending for the 2009–2014 period with detailed segmentation by product category, size of business, and vertical market.

Forecasts are broken into the following size-of-business segments and sub-segments:

  • SOHO business (1 to 4 employees)
  • Small business (5 to 9 employees, 10 to 19 employees, and 20 to 99 employees)
  • Mid-Sized business (100 to 499 employees and 500 to 999 employees)
  • Enterprise (1,000 to 4,999 employees, 5,000 to 9,999 employees, and 10,000 or more employees)

Forecasts are also broken down further into the following vertical markets:

  • SOHO (Small Office Home Office) business (1 to 4 employees)
  • Small business (5 to 9 employees, 10 to 19 employees, and 20 to 99 employees)
  • Mid-Sized business (100 to 499 employees and 500 to 999 employees)
  • Enterprise (1,000 to 4,999 employees, 5,000 to 9,999 employees, and 10,000 or more employees)
  • Forecasts are also broken down further into the following vertical markets:
  • Administrative and support services, waste management
  • Arts and entertainment
  • Construction
  • Education
  • Finance and insurance
  • Forestry, fishing, and agricultural services
  • Government
  • Healthcare and social services
  • Hospitality and food
  • Information and communication
  • Management of companies and enterprises
  • Manufacturing
  • Mining
  • Other services
  • Professional services
  • Real estate
  • Retail trade
  • Transportation utilities
  • Wholesale trade

It seems that there is only one way that cloud computing can go now – up, up and away!

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…