India Takes To The Cloud

India Takes To The Cloud

India is the global capital city of outsourcing. As a primary element of cloud computing, outsourcing has propagated the need for most countries to adopt cloud computing, with India being at the front line.

The role of telecommunication companies in the expansion of cloud computing is clearly indicated through the entry of Bharti Airtel into the category of service providers. Actually, the India’s largest telecommunications service provider has joined hand with Microsoft to supply elements of the office suite to small and medium enterprises in the country. In essence, this partnership is deemed an important move towards capturing the growing market for products from both companies. The emerging trend has made it possible for most organizations to access a multiplicity of goods through establishment of partnerships. Ultimately, Airtel expects to expand its data services, and Microsoft, well, continues to do what it does best. In addition to this, the Indian market has witnessed an expansion in the app market. The app market has achieved prominence following the prevalence of usage of smart phones in business and social circles. Ultimately, cloud computing is bound to expand, considering that most of the apps are hosted on online platforms.

Most tech experts are keen on monitoring the impact of cloud computing in India, considering that a huge proportion of the businesses are actually small and medium size. Research conducted by Nasscom pointed towards possibilities of the cloud computing market in India topping USD16 billion by 2020. This estimation is based on the current growth state, with the market standing at USD $ 400 million. In addition the industry is expected to be a top employer by 2015, creating over 2 million jobs in the country.

The achievement of this growth is primarily based on the ability of the country to develop befitting legal and economic enablers. As observed, the country lags behind in legal structures, specifically regarding protection of data and internet protocols as well as privacy laws. Although most organizations have been able to bypass these challenges, mass adoption of cloud computing is primarily dependent on the presence of such laws.

By Rick Watson

About Watson

Rick has been involved in computer technology for the last 17 years as a consultant to a number of Fortune 500 corporations. He is an avid reader of Sci-Fi books and is a big fan of collecting and restoring old sports cars.

View All Articles

Sorry, comments are closed for this post.

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Are You Sure You Are Ready For The Cloud: Security

Are You Sure You Are Ready For The Cloud: Security

Cloud Security For the last several months, we have been discussing ways to make sure you are ready for the next step in your IT evolution: Cloud. When review the different steps of making sure you are ready, one that I have intentionally avoided was Security. I spoke to you about “Security of Business”, but…

Cloud Service Provider Selection Considerations

Cloud Service Provider Selection Considerations

Why Cloud Brokers Make Sense Different workloads perform differently on different cloud service providers. Enough so that it is prudent in planning to consider the optimal configuration and the optimal CSP for your solution. Consider this old word problem from years ago. One person can carry two buckets of water. It takes 5 minutes to…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

Did You Know That There Is A Real SHIELD?

Did You Know That There Is A Real SHIELD?

The Real Shield You cannot make this up. The ODNI (Office of the Director of National Intelligence), an Act of Congress and a European Commission special “working group” known as Article 29 are all involved. Blame it on Edward Snowden. The Europeans are “concerned” (meaning: terrified) about the privacy protections surrounding any of their data…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor