The Challenge For Cloud Computing

The Challenge For Cloud Computing

Consumers are driving cloud adoption far faster than enterprise IT can accept. Analytically speaking, consumers are driving this incredible rate of change for enterprise employers. The challenge one faces is that cloud computing is leading an enormous change in the enterprise IT environment, which can broadly be called the “consumerization” of IT, and this phenomenon has somehow to cater for the needs of consumers.

The problem that follows this “consumerization” prodigy is that while consumers are wandering around with their personal clouds in their pockets, a whole lot of that cloud belongs to someone else; it belongs to another interest. So one’s personal consumption of a cloud is quite literally a threat to one’s employer. To make things clearer, take the example of the padding oracle attacks, which were predominantly initiated by common users; common users who clicked on an attachment in an email and let the bad guys in.

For most of the enterprise world, the public cloud is nothing but a menace. Yet one sees clear benefits and enormous cost advantages in the public cloud. So, the main challenge is redefined: to try to evolve what today is an enterprise IT process built around people, and consequently translate it into something that is more efficient and that takes advantage of the revolutions in technology but does not throw out the baby with the bath water.

In a nutshell, the real challenge is how to adopt this technology in a world where the rate of adoption is governed not by the technology, but by the rate at which humans can evolve their skill sets as they face new technologies. Arguably, this is what enterprise IT is all about. Thought provokingly, the rate at which enterprise IT will adopt cloud computing is the rate at which one can retire legacy skill sets from the enterprise IT department.

The human race experiences and lives in linear time; we think about what to do tomorrow, but when tomorrow comes, technology has moved exponentially up the curve a whole lot more than the average person could ever grasp. So, here we sit as humans in what our rough experience of computers is, but the world is radically different in terms of innovation. The dare is how to make humans evolve quicker so that they can adopt these sweeping technologies and do so in a way that is safe and secure. For the human species, this is the challenge of cloud computing.

By Haris Smith

Sorry, comments are closed for this post.

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…