Cloud Computing: A New Paradigm

Cloud Computing: A New Paradigm

Cloud Computing: A New Paradigm

Perception and interpretation of cloud computing with the existing experiences, beliefs and values that affect the way an individual perceives reality, admittedly, will not be easy to accept emerging new business-driven model with the new paradigm offers revolutionary processes.

Last year I read a whitepaper, titled “The Economics of The Cloud”, stating an old paradigm which replaced a new paradigm lead to large scale changes in the car industry. According to article, when cars emerged in the early 20th century, they were initially called “horseless carriages“. The first cars were the same as the carriages pulled by horses. And that was, in fact, what people called them: horseless-carriages, as seen in the photo to the left. Since the prevailing paradigm referred to the horse and carriage together widely held for centuries in a society, there was difficulty in understanding for such revolutionarily science coming with the new paradigm. Therefore, the engineers, in fact, could not imagine designing such a car more safe and comfortable way of carrying at that time because of the dominant paradigm.

Early pioneers of that era in the car industry failed contemplating the instigation of a future revolution in the new paradigm, such as limitations to hire a chauffeur (special driver) for each car. Much as it seems to have a bite at the cherry -of course contrast them with the current wisdom- meaning the situation is of tremendous investments, only if they were able to see the opportunities within the restriction of climate change on profitability respect to under present circumstances arising from car industry.

In comparable manner, put through a doubting reception from the majority, the opportunities of the cloud computing has a profound impact on the way in which we do business may not able to being perceived the unlocking hidden profits at the bottom of the iceberg throughout the formation of adequate perception of new paradigm.

New Business-Driven Model

The new paradigm of Cloud Computing matured over time with the new technological processes and platforms will enable to change the business-oriented models of organizations.

Hereafter no need to deliver IT services on-premises meet to demands since the comprehension of business is shifting with a new paradigm comes with a more holistic and qualitative approach. That is one way of looking at the business driven model says that computing services will be provided, on demand, how and when they are needed, quickly, efficiently, and very cost effective. Therefore, the business will drop to worry about IT capabilities and concentrate on their own requirements to make them more cost effective, but now in a scalable way of using the Internet to access the services provided by cloud computing.

At this point, we could say the term “win-win” situation for both global vendors of cloud technology offerings and also consumers in which cooperation leads to all participants benefiting. However, there will be a slight benefit for the environment hidden, in “Green profits” of the companies switching over to the cloud computing solutions. To put it in terms of Green IT, here are some quotes from the breaking ‘Green IT’ news;

The Carbon Disclosure Project released a report that found cloud computing can reduce energy consumption while improving efficiency within a company.

A study by Accenture, Microsoft and WSP Environment and Energy estimated that a company with about 100 people can reduce its energy output and consumption by about 90 percent by using cloud applications.”

Data Security Concerns

Its solid being seen the heavy resistance of organizations, affected by regulating against the new technologies, while moving from one paradigm to the revolutionary new science will provide new methods and techniques for business model. So, this ultimate challenge leads to restriction of the organization’s vision, and a precision of the security of confidential intellectual property match that can be achieved in no other way. New and re-defined methods and technologies result in greater perception and understand of the reflection of the cognitive style of the future.

It is not rare at all to find people who believe they are safe by hosting their data on-premises instead of cloud environment. As for me, they are like an ostrich with his head buried in the sand as everything is going well them by, feeling safe and secure falsely believing they know all they need to know.

It may be logical to raise the following question at this point: shouldn’t we take all possible security precautions early and seriously before the failures occur for the data that are sensitive for us? From my point of view, in fact, there is no question as to which is more accurate. This is a continuously improving process that is optimized itself.

The engineering might have started to struggle of man against nature, and this ongoing. The fundamental reason that is becoming more reliable of the aircraft that we use safely and is being the most preferred transportation is the crashed planes in the past and the people who died in it. As a result of the sensibilities as being sorrowful stories, the engineering renews steadily itself by taking advantage of nature and the necessary security is being improved continually for the benefit of humanity, and that will be continued.

Therefore, there will be no absolute endpoint on the matter of security. The only thing we need is to rely on technology at a certain point by taking the necessary precautions against the possible risks. The approach of the using technology after having matured enough, as a matter of fact this is our chronic problem in my sight, is more likely to miss the mark of technology at every turn. The only we can contribute the improvement of new technology by using it so that we don’t miss the opportunities by adapting to the new paradigm rapidly as well.

By Turgut Haspolat

————————————————————————————————–

Turgut is working for Fujitsu Technology Solutions as a Team Leader, System. He has been studying the disaster recovery and business continuity planning that leverages and benefits from virtualization and cloud-based technology in public sector. He has already prepared a business continuity architecture and strategy considering a private cloud model as part of the infrastructure to take advantage of the benefits of Microsoft virtualization and the System Center suite with the scale and flexibility to transform the way they deliver services to the business.

He has experience in business continuity with private cloud‏ infrastructure using technologies from Microsoft [SCOM, SCCM, SCSM, Hyper-V, Windows Server Clustering].

http://twitter.com/turguthaspolat

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Three Reasons Cloud Adoption Can Close The Federal Government’s Tech Gap

Federal Government Cloud Adoption No one has ever accused the U.S. government of being technologically savvy. Aging software, systems and processes, internal politics, restricted budgets and a cultural resistance to change have set the federal sector years behind its private sector counterparts. Data and information security concerns have also been a major contributing factor inhibiting the…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…