The Failure Of Private Cloud Initiatives

The Failure Of Private Cloud Initiatives

For some, it may be fast and easy to set up a private cloud, as long as technology is available. But technology plays only a small part in it when compared to the demands of business culture and user requirements. Most companies who have set up a private cloud have been disappointed because they have not able to adapt to it, or because their users have not been able to adapt to it. Expenses typically increase, and provisioning takes time. Therefore, if a company sets up a private cloud without the right objectives or configurations, a lot of unnecessary things happen and management is typically disappointed.

Disappointments can arise because cloud computing is seen only as a virtualized environment; however, cloud computing is more than this. When objectives are properly defined, a private cloud deployment can be successful. Most IT practitioners can’t differentiate a cloud environment from a virtualized computing environment. A virtual environment is one which is made available to a user by spinning up a virtual machine, whereas a cloud environment allows users to access a portal, picks out the services they want and provisions the services automatically for their use. Furthermore, users pay only for services they actually use. Any private cloud initiative will fail if IT personnel cannot successfully provision a cloud environment.

Another reason that private cloud initiatives fail is that users resist private cloud initiatives. Even at the conception stage, users quickly resist change because a public cloud is hyped as something easy to deploy and use. To successfully implement a private cloud IT personnel must be able to set long-term goals, as well as use some marketing skills. Due to the hype of the public cloud, business users often think that it is easy to provision a public cloud. With just the use of their credit card, they can provision a server, set up their applications, and have their cloud computing services available within an hour. However, more often than not, this doesn’t hold true because companies may have software applications that are not compatible with the cloud system. IT personnel must be able to inform business users of the limitations of the public cloud, as well as the advantages of a private cloud.

Another reason why plans to shift to a private cloud fail is that IT personnel don’t consider business users. Users are often cynical about IT and believe that any private cloud run by IT only reduces user productivity. This cynical attitude can often be traced back to IT personnels’ “we know best” mentality. If IT personnel are deaf to their users, any private cloud initiative will be doomed to failure.

Lastly, a private cloud initiative will fail if IT personnel market it as a highly flexible cloud that can accommodate every whim of the user. IT personnel fail to use an effective and efficient chargeback model to charge various business departments for what they actually consume. Failing to provide a chargeback provides the opportunity for users to press for items on a whim because such actions are not charged to their departments.

By Florence de Borja

Sorry, comments are closed for this post.

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…