Cloud Computing: An Ode to the Lost Server Huggers

Cloud Computing: An Ode to the Lost Server Huggers

Cloud Computing: An Ode To The lost Server Huggers

It is no longer a question. The Cloud is officially the future, it is here to stay and will probably take over everything in the next two to three years. As some industry watchers are saying the only major hurdle still blocking the way of the Cloud’s inexorable march are the server huggers still clinging on to their legacy technologies and private data centres. However, I totally understand what they are going through as virtual gods of the data centre, these server professionals have actually paved the way for the success of Cloud computing but are now facing what every previous generation of microprocessor has met: obsolescence.

Rather than steam roll these veterans of the server battlefield into pancakes beneath the glacier that is the Cloud, what many of these guys or rarely gals are forgetting is that there are still two options for them. Both will require change to a certain degree but only one may require them to start from scratch.

Rather than fight the unstoppable flow of Cloud adoptions, these server huggers would do well to focus their efforts on finding out how to join the giants currently populating the field of public Cloud. This is because they seem to be forgetting that these Cloud giants are actually supporting everyone else with their own oversized data centres. By joining and working at these data centres server huggers would not only be able to utilize their existing skill set but would actually be valued cogs in the great Cloud machine. Granted, they would still probably require some form of certification for the Cloud. Its a shame that there is no fast track for these server huggers to do so though, as it would be ever so easier to point them in the right direction.

The second option of course is to accept any push to the Cloud, support it and seek out Cloud management certification. While this is by no means starting from scratch it still proves to be a huge leap for server huggers who thought that they no longer had to learn new things anymore. Microsoft, IBM and even Red Hat are all offering Cloud Certification courses. CIO’s and other decision makers would do well to offer such certifications to those identified as server huggers so that they may be able to stave off possible pancaking by the time full adoption of the Cloud is finally in place.

By Muzaffar Ismail

Muzaffar Ismail is an avid technology watcher on the hardware side of the Cloud in particular around the areas covering Asia in general.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…