Be A Cloud Executive Officer

Be a Cloud Executive Officer

Chief executive officers of the 2010s ignore the cloud at their peril. As we at CloudTweaks know better than most, cloud computing has become an indelible centerpiece of the national conversation on all things technology. Few developments since the arrival of the Internet have ignited such discourse or stood to offer so much change to our relationship with computers. A refusal to acknowledge cloud, then, is essentially an admission of irrelevance in virtually every industry that involves either computer-borne data, the Internet, or a combination thereof.

Employees in such industries, now more self-sufficient and enterprising than ever, probably nurse secret (or not-so-secret) fixations on the cloud, be it positive – “The cloud’s the best thing since the advent of the Web” – or negative – “Cloud equals disaster for data security and protection, et cetera.”

No matter an employee’s perspective on cloud, a CEO’s resistance to it is unequivocally futile. Big corporate businesses already outmuscle more diminutive operations with comparatively massive technological resources, both virtual and human. Smart companies the same size as one’s own have probably already embraced cloud to some degree. And the cloud can convert a petite young upstart into a serious pretender to a larger company’s throne in one fell swoop. Cloud can equalize as easily as it can sift the savvy from the slackers.

Successful — savvy — CEOs marry their chiefdom with at least a modicum of dexterity within the cloud. After having exercised some reconnaissance work, which should involve pinpointing their business’ current shortcomings and analyzing potential ROI figures, they ascertain how the cloud can allow their company to streamline and economize. They conduct a cloud cost benefit analysis: a determination of the set-up and entry costs for cloud, an assessment of the applications most apt for a cloud computing retrofit, and a mining of the current resources and limitations of their business (the scope of the budget, identifying standout knowledgeable employees, etc.)

The choice to proactively mount their own data security and protection schemes elevates great Cloud Executive Officers from wimpy or uninspired dabblers. These CEOs thoroughly vet each type of cloud (from Gmail and other types of SaaS to IaaS providers like Amazon EC2). They plot each move before taking a step forward, refusing to fall for just any software offered as-a-service. What is more, they harness governmental resources to support their backup aims, including FedRAMP, FISMA, and SSAE 16.

Legendary cloud CEOs, upon executing several of the above directives, stay the course. Attempts to dissuade them from cloud’s capacities are rebuffed by the deep belief they have already been developing. Instead, they motivate and convince their employees, peers, stockholders, all involved, about the potential of cloud computing in spite of its risks. Each grand gesture – unveiling a new setup and overhaul scheme, for example — is backed up by deliberation and tact. And naturally, they nourish their knowledge with rich sources (like CloudTweaks, of course) to stay cloud-sharp and successful.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…