The Cloud Build Up: Findings From Gartner’s Cloud Hype Cycle 2012

The Cloud Build Up: Findings From Gartner’s Cloud Hype Cycle 2012

Ventures today are on the verge of modifying their overall cloud-purchase conduct. The said has been prompted primarily by the diverse range of available operational options offered by the cloud technology providers including pace of implementation, associated finances and requirement-adaptation dynamics. Conversely, ventures still are distant from entirely giving up their conventional models and applications in favour of making space for the cloud; a recent study conducted by Gartner reveals.

hype cycle

The findings pour out of the eagerly awaited cloud technology analysis – the Gartner Hype Cycle for Cloud Computing, 2012. The report indicates that the most favorable of the results are demonstrated by companies that concentrate their (fiscal and human) energies on one particular cloud approach and making the most out of it to step up on the performance. Establishing a tactical framework of general objectives to start off with and then consequently working out towards the exact pre-crafted achievables significantly augments the chance of extracting success out of cloud-based policies. Businesses that think of the cloud as a mere cost cutting remedy are bound to wobble along their transitional journey, to an extent that would knock them off the course.

The Hype Cycle clearly describes that although the cloud upsurge might have reached the steepest levels in years, the cloudwashing phenomenon continues to haunt cloud-endorsers, serving further as a source of perplexity and puffed up expectations. This leads to an inevitable slow down of the cloud sales cycle in the long run. Among the cloud service providers, the ones that are living up to their promise of delivering timely, flexible, budget-friendly cloud solutions are beginning to surpass those that make use of cloudwashing as their frontline selling policy.

There are additional significant findings originating from the report. Summing it up, cloud based email is projected to have an in-enterprise adaption rate of up to 10% by the end of the year 2014. The figure has gone done by an exact half as opposed to the estimates of 20% in the previous Hype Cycle findings. This symbolizes unpretentious rise, as the embracing rate of this particular category hovered between 5 to 6% in the year 2011. The study also establishes private cloud as being the prime area of interest, with more than 75% of the participants chalking out a strategy in the said area. Software-as-a-Service is also securing firm ground in expansion plans of businesses. Gartner is convinced that more than 50% of companies will incorporate SaaS application components in their technical operations. Platform-as-a-Service remains the most widely misunderstood facet of cloud computing.

In a nutshell, Gartner’s Cloud Computing Hype Cycle is a vivid indicative of the fact that cloud-based initiatives, when inline with surgically-tailored thorough business mapping, bring about the most significant of returns (both tangible and abstract) to a venture.

The cloud band wagon is rolling big – and it’s about time corporations do their math and hop onboard.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Comics
The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…