Cloud Computing: A New Paradigm

Cloud Computing: A New Paradigm

Cloud Computing: A New Paradigm

Perception and interpretation of cloud computing with the existing experiences, beliefs and values that affect the way an individual perceives reality, admittedly, will not be easy to accept emerging new business-driven model with the new paradigm offers revolutionary processes.

Last year I read a whitepaper, titled “The Economics of The Cloud”, stating an old paradigm which replaced a new paradigm lead to large scale changes in the car industry. According to article, when cars emerged in the early 20th century, they were initially called “horseless carriages“. The first cars were the same as the carriages pulled by horses. And that was, in fact, what people called them: horseless-carriages, as seen in the photo to the left. Since the prevailing paradigm referred to the horse and carriage together widely held for centuries in a society, there was difficulty in understanding for such revolutionarily science coming with the new paradigm. Therefore, the engineers, in fact, could not imagine designing such a car more safe and comfortable way of carrying at that time because of the dominant paradigm.

Early pioneers of that era in the car industry failed contemplating the instigation of a future revolution in the new paradigm, such as limitations to hire a chauffeur (special driver) for each car. Much as it seems to have a bite at the cherry -of course contrast them with the current wisdom- meaning the situation is of tremendous investments, only if they were able to see the opportunities within the restriction of climate change on profitability respect to under present circumstances arising from car industry.

In comparable manner, put through a doubting reception from the majority, the opportunities of the cloud computing has a profound impact on the way in which we do business may not able to being perceived the unlocking hidden profits at the bottom of the iceberg throughout the formation of adequate perception of new paradigm.

New Business-Driven Model

The new paradigm of Cloud Computing matured over time with the new technological processes and platforms will enable to change the business-oriented models of organizations.

Hereafter no need to deliver IT services on-premises meet to demands since the comprehension of business is shifting with a new paradigm comes with a more holistic and qualitative approach. That is one way of looking at the business driven model says that computing services will be provided, on demand, how and when they are needed, quickly, efficiently, and very cost effective. Therefore, the business will drop to worry about IT capabilities and concentrate on their own requirements to make them more cost effective, but now in a scalable way of using the Internet to access the services provided by cloud computing.

At this point, we could say the term “win-win” situation for both global vendors of cloud technology offerings and also consumers in which cooperation leads to all participants benefiting. However, there will be a slight benefit for the environment hidden, in “Green profits” of the companies switching over to the cloud computing solutions. To put it in terms of Green IT, here are some quotes from the breaking ‘Green IT’ news;

The Carbon Disclosure Project released a report that found cloud computing can reduce energy consumption while improving efficiency within a company.

A study by Accenture, Microsoft and WSP Environment and Energy estimated that a company with about 100 people can reduce its energy output and consumption by about 90 percent by using cloud applications.”

Data Security Concerns

Its solid being seen the heavy resistance of organizations, affected by regulating against the new technologies, while moving from one paradigm to the revolutionary new science will provide new methods and techniques for business model. So, this ultimate challenge leads to restriction of the organization’s vision, and a precision of the security of confidential intellectual property match that can be achieved in no other way. New and re-defined methods and technologies result in greater perception and understand of the reflection of the cognitive style of the future.

It is not rare at all to find people who believe they are safe by hosting their data on-premises instead of cloud environment. As for me, they are like an ostrich with his head buried in the sand as everything is going well them by, feeling safe and secure falsely believing they know all they need to know.

It may be logical to raise the following question at this point: shouldn’t we take all possible security precautions early and seriously before the failures occur for the data that are sensitive for us? From my point of view, in fact, there is no question as to which is more accurate. This is a continuously improving process that is optimized itself.

The engineering might have started to struggle of man against nature, and this ongoing. The fundamental reason that is becoming more reliable of the aircraft that we use safely and is being the most preferred transportation is the crashed planes in the past and the people who died in it. As a result of the sensibilities as being sorrowful stories, the engineering renews steadily itself by taking advantage of nature and the necessary security is being improved continually for the benefit of humanity, and that will be continued.

Therefore, there will be no absolute endpoint on the matter of security. The only thing we need is to rely on technology at a certain point by taking the necessary precautions against the possible risks. The approach of the using technology after having matured enough, as a matter of fact this is our chronic problem in my sight, is more likely to miss the mark of technology at every turn. The only we can contribute the improvement of new technology by using it so that we don’t miss the opportunities by adapting to the new paradigm rapidly as well.

By Turgut Haspolat

————————————————————————————————–

Turgut is working for Fujitsu Technology Solutions as a Team Leader, System. He has been studying the disaster recovery and business continuity planning that leverages and benefits from virtualization and cloud-based technology in public sector. He has already prepared a business continuity architecture and strategy considering a private cloud model as part of the infrastructure to take advantage of the benefits of Microsoft virtualization and the System Center suite with the scale and flexibility to transform the way they deliver services to the business.

He has experience in business continuity with private cloud‏ infrastructure using technologies from Microsoft [SCOM, SCCM, SCSM, Hyper-V, Windows Server Clustering].

http://twitter.com/turguthaspolat

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…