Developing Economies In Love With Cloud Computing

Developing Economies in Love with Cloud Computing

The Business Software Alliance, in a recent research study, has reported that time is ripe for the cloud computing service providers to make a lasting impact particularly in budding economies via free as well as paid offerings, but at the same time the malicious lot amongst the beneficiaries is more probable to share user-identification specifics, rendering license misuse inevitable in some cases. The research findings are an outcome of mutual collaboration between Business Software Alliance and Ipsos Public Affairs.

BSA and IPA collectively covered about 15,000 end users in roughly 33 different countries, probing into their understanding of cloud computing services and gaining an insight into how they benefit from the cloud. Online services enable creation, management and storage of digital content and allow remote access via almost any internet enabled device, computers in particular – this is how 45 percent of end-users across the globe describe their utility of computers.

It is startling to discover that the same percentage of the said utility rises to as high as 50% for developing economies such as Thailand, Peru, Argentina and Malaysia. Established economies such as United States, Germany, France and the United Kingdom, on the other hand, exhibit a lower proportion – 33% to be exact.

Statistics further reveal that more than 85 percent of cloud users rely upon cloud computing services for personal purposes including storage and retrieval of digital content. In addition, 33 percent classify their usage of cloud services purely for business motives. The figures, again, are higher for the case of developing economies as opposed to the established ones.

President and CEO of BSA, Robert Holleyman, explains that “We’re seeing a leapfrog effect. A lot of recent adopters of computers and information technology are jumping straight to the cloud. If you live in a developing economy and use a computer, then, likely as not, you also use cloud computing services at least some of the time for email, word processing, document or photo storage, or other things – although you might not understand those services to be cloud computing.’’

While this all is primarily positive, the survey still unveils a source of dire unease. There are about 42 percent of business end users that possess active subscriptions to paid cloud services and ironically, share their login details within their organization.

There is, however, an evident segregation in the above mentioned context amongst the budding and the established economies. In budding economies, 45 percent of the business cloud users share their cloud account internally, while the same percentage for developed economies lies at 20 percent, mounting to the difference of a significant 15 percent.

Holleyman describes these statistics as eye-opening. He clarified that “It doesn’t necessarily mean 42 percent of business users are pirating cloud services. Some licenses may allow sharing of accounts — and many cloud service providers charge not by seat but by the volume of computing resources consumed, making the path users take to access those resources less important.”

The figures are a vivid indicative of budding economies’ willingness to endorse both paid and free versions of cloud services. This is bound to serve as good news for cloud service providers and associated start ups. In addition, 56 percent of paid cloud users considering credential-sharing unethical is a healthy omen for the future of cloud licensing in promising economies.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Comics
The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…