Rumors In Cloud: What A Tangled Web We’ve Woven

Rumors in Cloud: What a Tangled Web We’ve Woven

As our community has witnessed cloud’s rise to headliner, we have also failed to dispel certain rumors that could hinder its acceptance. Incorrect information merely hampers the progress cloud computing could make as the IT phenomenon it is. A couple ideas in particular stand out to me right now, hackneyed and trotted out too often.

The first misconception: “private cloud is too pricey for rookies.” The rhetoric of public versus private colors many sectors of society: education, class, government, and onward. It holds that “public” connotes less of something provided for more, and “private” the exact opposite: more of it for less of us. This diction does not necessarily hold water in the cloud computing conversation. True, public cloud and its “pay-as-you-go” construction does appear to cost less. Yet delivery from a private cloud can actually beat the public option in spendthrift efficiency, in the same way that buying groceries and eating in costs less, in the long run, than eating out nightly. Newbies to the cloud will need to take into serious account such details as business size, data protection, and compliance concerns, beyond just pricing of service, to determine and strategize between public and private cloud.

Another contentious thought: “In the pool of cloud computing, you ought first to dip in your toes.” My recommendation: cannonball instead. The mere consideration of cloud computing is an essential gesture toward rendering a business more efficient, flexible, and technologically empowered. But the consideration remains just that — an opening gesture — and cloud’s true assets will remain untapped until the business leaps into the fray wholeheartedly. 2010s-era IT is unprecedentedly demanding: today’s enterprises must contend with data consumption that can explode or slim down by the day, the costs of addressing such techy heave-ho, and similar iterations of a faster-paced landscape. Cloud, when bravely, completely embraced, can equip a company with a full array of applications required to truncate demand for human employees (liberating them to be of greater use elsewhere) within mere hours. And managing these applications is made a cinch these days with enormous progress in OS systems. In short, going the whole hog on cloud can have you saying “hooray” much more quickly.

We all have a stake in clarifying cloud. Without transparency, such myths will distract attention away from the deeper concerns that deserve bigger recognition: namely, the global failure to address redundancy in all clouds, public and private alike. (More on this issue to come, next week.)

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 – Previewing The Year Ahead

Digital Identity Trends 2017 The lack of security of the Internet of Things captured public attention this year as massive distributed denial of service attacks took down much of the internet. The culprits? Unsecured connected devices that were easily accessed and manipulated to do the bidding of shadowy hackers. When you can’t access Netflix anymore,…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…