Are Cloud Computing Stocks Overvalued?

Are Cloud Computing Stocks Overvalued?

Cloud Computing Stocks

If one were looking for lessons in creating wealth by investing in cloud computing stocks, there can be no better teacher than Warren Buffett. In fact, I would venture that he is the guru of value investing, a an investment paradigm that derives from the ideas on investment and speculation that Ben Graham and David Dodd derived while at Columbia Business School. Not surprisingly, Buffett was one of Graham’s students.


Value investing is investing for the long term; as Buffett once said, “My favorite holding period is forever.” Therefore, such a strategy is based on buying stocks at less than their intrinsic value. Do cloud computing stocks qualify as value stocks? That is a question that many are seeking an answer to.

The problem in realizing value of cloud computing stocks is the difficulty in assessing future earnings. Agreed that recent research indicates that spending on cloud computing stocks can only go higher and, but the very newness of the technology leaves room for doubt. There’s no telling whether security concerns can kill cloud computing or there may be a paradigm shift to a completely different technology.

While many truly believe that cloud computing is here to stay and that stocks of companies investing in this field represent true value for the future, there are others at the opposite end of spectrum who have even compared the recent rise of relevant stocks as symptomatic of, as Alan Greenspan put it, “irrational exuberance.”

If this phrase sounds familiar, there’s a good reason for it. Greenspan first uttered these words when anything related to technology was considered to be gold and tech stocks reached stratospheric heights. Until the bubble burst.

Yes, we are talking about the dotcom bubble of the last decade. If you feel this analogy is a bit far-fetched, consider what Swiss investment bank UBS has to say. In a recent research note, creatively titled Are We In A Cloud Computing Bubble?, UBS makes a comparative analysis between the top 40 expensive tech stocks today and in March 2000 when the dotcom bubble was at its zenith.

Top Cloud Computing Stocks

Although the top tech companies today are comparatively healthier than their dotcom era counterparts if P/E and market value/sales ratios are taken into account, their rapid ascent as compared to the other tech stocks does give cause for concern, especially since a lot of the top ones are invested in cloud computing – Salesforce.com, Netflix, Akamai, etc.

Now, this data can be interpreted in two ways. The cloud computing proponents would say that is exactly what they expect – that the stocks are rising because their cloud investments are adding value to their shares. The naysayers would protest that it is “irrational exuberance” that is fueling this growth, and that another tech bubble is in the offing.

While it is difficult to determine with absolute certainty who is right, I would bet my money on the former.

There are three reasons for this:

  1. P/E and market value/sales ratios have been used to determine stock value for a long time. They are reliable indicators and suggest that the recent price increases is not a fluke.
  2. While the dotcom bubble was born out of overestimating the value of technology that was completely new, cloud computing, in spite of its newness, has a long heritage. Many of the concepts of cloud computing – utility computing, distributed computing – and resources – data centers, Internet – are tried and tested technologies.
  3. The dotcom bubble came from every second computer engineer trying to become an entrepreneur. The cloud computing revolution, on the other hand, is largely driven by very big IT players like IBM, Amazon, Oracle, etc.

At the same time, I would advise caution if cloud computing stocks continue to rise at an alarming pace. There are still issues to be resolved before it becomes the definitive standard in IT.

By Sourya Biswas

Sorry, comments are closed for this post.

Comic
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

The Age of Data: The Era of Homo Digitus

The Age of Data: The Era of Homo Digitus

The Age of Data In our digital era data deluge – soaring amounts of data, is an overriding feature. That’s why it’s fitting to focus on the concept of Homo Digitus, which I first learned about about in“The creative destruction of medicine: How the digital revolution will create better health care,” by Eric Topol, and…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…