Go Away – You’re Not Serious About The Cloud

Go Away – You’re Not Serious about the Cloud

Quit reading this. Move on. Your business has no chance of cloud prosperity. You’ve chosen to ignore several key tenets of successful integration into the cloud computing sphere, and you now find your business in an IT rut. Should you still continue to be reading this, pat yourself on the back. You’re at least willing to entertain the idea that your cloud acumen could improve. I’ll keep it simple. If you can’t shape up in at least one of these three vital areas to cloud success, you ought to ship out.

Have you embraced service-reverent architecture? Remember that cloud is, at is most elemental, an amalgam of services. Lacking a solid or well-refined strategy that considers how a company may grow into cloud computing can easily create a balloon in unneeded expenditures and services that mimic, rather than compliment, one another. It is worth investigating what Wikipedia describes as service-based architecture: the implementation of a system of services as the bedrock of a business endeavor that can adapt or streamline as needed. Within such architecture, cloud applications are selected based on their capacity to harmonize with the business’ fundamental identity, as well as on how well they synchronize with existent software.

Have you appointed a “cloud mastermind?” Every thriving business operates on some agreement of hierarchy, and this same insistence on leadership should inform a business’ cloud computing aspirations. A well vetted expert should be appointed with the responsibility of determining, for example, the expectations of cloud services, which of those services are purchased, and how the organization will go about bankrolling them. I would go so far as to describe such a professional as a “cloud mastermind.” But the judgment of this figure is not so clouded as to ignore a long-term perspective on cloud within the business. Cloud computing continues to exist cyclically. Healthy businesses regularly grow into and out of services, and any cloud mastermind worth her salt should develop a plan that accounts for a selection of, and a foreshadowing into, cloud-borne resources both today and a year (or two) from now.

Finally, how complex can you stand cloud computing to be? The previously rampant belief in the diametric opposition between public clouds and their private counterparts is now considered an old hat vestige of IT snob appeal. Few tech professionals in today’s landscape will profess an adherence to any one type of cloud, rather opting for a “cloud constellation” that encompasses many a computing system: public, private, hybrid, and independent service providers. A business in pursuit of reaping cloud’s benefits should sow the seeds of a plural cloud mentality at the outset, one that is personalized and adapted to that particular business’ needs. Failure to do so leaves a business susceptible to risks such as vendor/service entrapment, challenges in recalling data on demand, and struggles in scalability calibrated to the ebbs and flows of demand.

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…