5 Challenges in the Journey to the Cloud

5 Challenges in the Journey to the Cloud

On my blog, I have already said that Cloud Computing is a Safe Bet for the Future, defining and showing us the shape of things to come for the IT industry. I have discussed about advantages and disadvantages, about the hows, the whens and the whys, about dos and don’ts. And, in my opinion, sooner or later, most businesses will start their migration to the cloud and like any epic journey it is not without challenges.

I believe these are the most common challenges in the journey to the cloud:

  • Lack of knowledge and understanding is the first obstacle to be conquered. Although cloud computing is on everyone’s mind and sometimes it feels like there is an overabundance of information on the topic, this does not translate into a proper understanding of the issue. There are many misunderstandings about what the cloud can and cannot do, about the differences between services, confusions about choices, like public, private or hybrid cloud. Presenting actual examples and case studies of completed work, relevant to businesses, would help improve knowledge and understanding. Learning from people that have actually been through these migrations is also helpful.
  • Fear is another challenge to be overcome. First, the fear of the unknown and mistrust in new technologies that may have not been tested enough, and it is the cloud computing industry’s responsibility to educate the market. Secondly, there are fears related to security issues and the loss of control over data and systems.
  • Security is probably the biggest issue. Will my data be secure? Who will have access to it? Where will it be stored? Is the data well protected in case the system is attacked? These are questions being asked, and beside technical provisions there are also legal and compliance issued to be solved. Policies and contracts are very important here and businesses are advised to look through them carefully.
  • Standards are a challenge in the sense that there are no universally recognized standards, which does not help with the trust issues, but also the standardization process in itself is very complex. In my article Cloud Computing Standards – is it time? I have discussed how standardization would help the industry.
  • Reliability and availability are the problems most present in the news, when a service is down it gets attention from the media. And I think in this respect it is important to have a pragmatic approach and put things in perspective. Applications can fail, whether they are hosted in the cloud, managed by a third party provider or in-house. And although the problems have been widely reported, most of the time the cloud has proved extremely reliable. But it is important to have a SLA with your provider in place, with clearly stated consequences in case something does go wrong.
  • Integration and Migration are complex issues, but the IT industry is rising to the challenge and the process can be properly managed. And although the migration and integration process may be complicated, the end result will be easy to manage IT resources so in the long term it becomes easier and not more difficult.

I have chosen here what I believe are the 5 key challenges on the road to cloud computing and they may seem formidable, but solutions exist for each of them. In previous posts I have discussed in detail an actual cloud computing implementation and how various challenges were overcome. And I think we need to remember that nothing worth doing is not without challenges and the benefits are definitely worth it.

By Rick Blaisdell

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…