The Cloud Build Up: Findings From Gartner’s Cloud Hype Cycle 2012

The Cloud Build Up: Findings From Gartner’s Cloud Hype Cycle 2012

Ventures today are on the verge of modifying their overall cloud-purchase conduct. The said has been prompted primarily by the diverse range of available operational options offered by the cloud technology providers including pace of implementation, associated finances and requirement-adaptation dynamics. Conversely, ventures still are distant from entirely giving up their conventional models and applications in favour of making space for the cloud; a recent study conducted by Gartner reveals.

hype cycle

The findings pour out of the eagerly awaited cloud technology analysis – the Gartner Hype Cycle for Cloud Computing, 2012. The report indicates that the most favorable of the results are demonstrated by companies that concentrate their (fiscal and human) energies on one particular cloud approach and making the most out of it to step up on the performance. Establishing a tactical framework of general objectives to start off with and then consequently working out towards the exact pre-crafted achievables significantly augments the chance of extracting success out of cloud-based policies. Businesses that think of the cloud as a mere cost cutting remedy are bound to wobble along their transitional journey, to an extent that would knock them off the course.

The Hype Cycle clearly describes that although the cloud upsurge might have reached the steepest levels in years, the cloudwashing phenomenon continues to haunt cloud-endorsers, serving further as a source of perplexity and puffed up expectations. This leads to an inevitable slow down of the cloud sales cycle in the long run. Among the cloud service providers, the ones that are living up to their promise of delivering timely, flexible, budget-friendly cloud solutions are beginning to surpass those that make use of cloudwashing as their frontline selling policy.

There are additional significant findings originating from the report. Summing it up, cloud based email is projected to have an in-enterprise adaption rate of up to 10% by the end of the year 2014. The figure has gone done by an exact half as opposed to the estimates of 20% in the previous Hype Cycle findings. This symbolizes unpretentious rise, as the embracing rate of this particular category hovered between 5 to 6% in the year 2011. The study also establishes private cloud as being the prime area of interest, with more than 75% of the participants chalking out a strategy in the said area. Software-as-a-Service is also securing firm ground in expansion plans of businesses. Gartner is convinced that more than 50% of companies will incorporate SaaS application components in their technical operations. Platform-as-a-Service remains the most widely misunderstood facet of cloud computing.

In a nutshell, Gartner’s Cloud Computing Hype Cycle is a vivid indicative of the fact that cloud-based initiatives, when inline with surgically-tailored thorough business mapping, bring about the most significant of returns (both tangible and abstract) to a venture.

The cloud band wagon is rolling big – and it’s about time corporations do their math and hop onboard.

By Humayun Shahid

About Humayun

With degrees in Communication Systems Engineering and Signal Processing, Humayun currently works as a lecturer at Pakistan's leading engineering university. The author has an inclination towards incorporating quality user experience design in smartphone and web applications.

View All Articles

Sorry, comments are closed for this post.

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

Dismissal Of Class Action Lawsuit A Setback For Internet Privacy

A Setback For Internet Privacy On Monday the Third U.S. Circuit Court of Appeals (a federal appeals court) unanimously dismissed a class action lawsuit by parents of children under the age of 13 who had used Nickelodeon’s websites against Google and Viacom (which owns the Nickelodeon websites). This was a result of litigation beginning in…

Controversial Chinese Cybersecurity Law Under Review Again

Controversial Chinese Cybersecurity Law Under Review Again

Cybersecurity Law BEIJING. The National People’s Congress, the equivalence of the Chinese Parliament, moved forward in drafting a second version of a controversial cybersecurity law first introduced almost a year ago. This means the law is thought to be closer to passing and will bring greater censorship for both foreign and domestic citizens and businesses.…

Personal Account of Google CEO Compromised

Personal Account of Google CEO Compromised

Personal Account Compromised The security of our information online, whether it’s our banking details, emails or personal information, is important. Hackers pose a very real threat to our privacy when there are vulnerabilities in the security of the services we use online. It can be worrying then when the CEO of perhaps the largest holder…

How You Can Improve Customer Experience With Fast Data Analytics

How You Can Improve Customer Experience With Fast Data Analytics

Fast Data Analytics In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end…

Data Protection and Session Fixation Attacks

Data Protection and Session Fixation Attacks

Keeping the man out of the middle: preventing session fixation attacks In a nutshell, session fixation is a type of man in the middle attack where an attacker is able to pretend to be a victim using a session variable. For instance, let’s say you have an application that uses sessions to validate the user.…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Perfect For Your Startup

Cloud Computing Services Chances are if you’re working for a startup or smaller company, you don’t have a robust IT department. You’d be lucky to even have a couple IT specialists. It’s not that smaller companies are ignoring the value and importance of IT, but with limited resources, they can’t afford to focus on anything…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…