Cloud Computing: A Cloudy World

Cloud Computing: A Cloudy World

Cloud Computing: A Cloudy World

There has been a thunderstorm of growing noise surrounding Cloud Computing in the past 24 months. Vendors, analysts, journalists and membership groups have all rushed to cover the Cloud medium – although everyone seems to have their own opinion and differing definition of cloud computing. According to the most common definition, it is Internet-based computing where shared resources, software and information are supplied to users on demand, rather like a utility company would supply electricity, water or gas. The term is not new; vendors such as Salesforce.com have provided Cloud services in different guises for many years. Other players have been swift to get on board, including Microsoft, HP, IBM, Amazon and Google, to name but a few. Put simply, users now have the choice of a new way to consume computing power, applications and data. No longer is it necessary to buy software on a floppy disk or a CD. Instead, you can have immediacy of delivery through the Internet for an application you want now. Users have been educated into this way of working with iTunes and app stores, and they’ve come to expect a seamless link between their locally run application and data and information from the Internet – and at a very digestible and economic price point. Buying a robust, polished application or game for below £1 is now taken for granted.

As an average user you are also likely to be using cloud computing in the form of webmail, Flickr, YouTube, Facebook and a plethora of other services; storing what you would consider private information in the Cloud without knowing where it is in reality… or even caring. In effect, Cloud has become a very simple and trendy way of describing all things that occur outside the firewall whether it be on a corporate network or on your home PC. And Cloud computing is already helping to shape the way we digest IT both at home and in the workplace. It is simply a new ‘form factor’, a new way of delivering a solution to a customer. We have seen new form factors disrupting and changing many market sectors already. Think of Blockbuster Video, once the darling of the entertainment world and now struggling to survive against the new delivery factors of Netflix and LOVEFiLM. Tower Records, once a worldwide brand, has been put out of business by the ability for users to now purchase music faster and cheaper via iTunes and online music stores.

The same trends are occurring in computing. The extraordinary speed at which Cloud computing has come to dominate the landscape has caught many by surprise. None deny it is the Zeitgeist for 2010 when looking back at the past year. With bold press statements such as “Cloud computing will boost UK economy by £30bn a year” grabbing headlines, it’s no wonder it is at the centre of so much discussion and scepticism. With Cloud computing expected to enjoy an adoption rate and growth of between 30 to 40 per cent per year, every year for the next five years, vendors are rushing to launch and push their cloud offerings. From a customer point of view, it is obviously a good thing to have more choices – although you should be aware that in reality there is a wide range of maturity levels amongst vendors, with some of them taking their first steps and looking for their first few candidates for experimental purposes. The major brands, Microsoft, Google, HP, etc are all endorsing cloud as key to their future (Microsoft recently announced the majority of its developers have been moved to its cloud platform), and in both business and at home it will certainly change the way we do so many things. Cloud computing offers substantial benefits including efficiencies, innovation acceleration, cost savings and greater computing power. No more 12-18 month upgrade cycles; huge IT burdens such as system or software updates are delivered automatically with cloud computing and both consumers, small and large organisations can now afford to get access to cutting-edge innovative solutions. Cloud computing also brings green benefits such as reducing carbon footprint and promoting sustainability by utilising computing power more efficiently.

But be warned… There will be some cloud negatives to go with all the positives. For example, with so much reliance on applications and data stored at the Internet level, what happens when you lose your Internet connection, can’t get a mobile 3G connection or the service itself isn’t available for a period? In all cases, due to circumstances outside your control, you cannot access your data, your photos or perform the action when and where you wanted. More worryingly, we have also seen a continued increase in threats coming from the Internet from spam, phishing (fake eBay, bank, etc. e-mails asking you to login in order to steal your details), viruses, spyware and scams. There was more malware on the internet in the last 18 months than the last 18 years combined. Never in the field of internet conflict has so much impact caused by so few to so many. The attackers have gone Cloud and are also utilising the great virtual computing power base to their advantage.

We are already starting to see malware targeting non-PC devices. It’s in its early stages, but it is inevitable we will see more targeting of smartphones, tablets and perhaps even Apple Macintosh as the data that users send to the Cloud becomes more valuable – and the wider range of applications used to access it grows at a rapid rate. Today’s generation of users expect to be able to access their applications from their iPhone, iPad, BlackBerry or Android device, and they expect web-based applications and resources to be readily available to those devices. We are entering a time when seemingly infinite IT power and information is available to a user on the smallest of devices, on the move and at a price affordable to the average consumer. Looking back, who would have expected that in 2011 you could have a 59p application on your phone which could ‘listen’ to a music tune being played in a bar and in seconds, using the internet (accessing massive Cloud power to do the look up and recognition analysis), present to you the details of the track and a ‘click here’ to pay for immediate download of the song!

The chances are that Cloud will accelerate this affordable power still further. Just imagine where we will be in ten years time! With so much happening so fast, the pressure is on IT experts to not only deliver more innovation but also greater security to defend it. As devices get more powerful, the internet faster, the demand and supply of Cloud applications will sky rocket and the power in the hands of the user will be greater than we have ever delivered before. Remember with great power, comes great responsibility and your responsibility is to protect the data, your ID and the information valuable to you. You would not go out and leave your front door open. Therefore, don’t leave your ‘virtual’ front door open when connecting to the internet and such powerful applications. By all means be a Cloud user, but be safe and be secure in doing so.

By Ian Moyse

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

New Report Finds 1 Out Of 3 Sites Are Vulnerable To Malware

1 Out Of 3 Sites Are Vulnerable To Malware A new report published this morning by Menlo Security has alarmingly suggested that at least a third of the top 1,000,000 websites in the world are at risk of being infected by malware. While it’s worth prefacing the findings with the fact Menlo used Alexa to…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Utilizing Digital Marketing Techniques Via The Cloud

Utilizing Digital Marketing Techniques Via The Cloud

Digital Marketing Trends In the past, trends in the exceptionally fast-paced digital marketing arena have been quickly adopted or abandoned, keeping marketers and consumers on their toes. 2016 promises a similarly expeditious temperament, with a few new digital marketing offerings taking center stage. According to Gartner’s recent research into Digital Marketing Hubs, brands plan to…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…