Factors That Slow Down Cloud Computing Progress

Factors That Slow Down Cloud Computing Progress

Cloud Progress

Cloud computing has become the technology to be relied upon nowadays. Individuals and businesses in equal measure utilize it in different capacities because it has numerous benefits, such as efficiency in running IT function processes and affordability. Despite of this, there are many people who don’t fully take advantage of cloud computing’s potential. This article gives you some of the probable reasons for this trend.

Cloud computing cynics

For every great technology that comes around, there are cynics and pessimists, along with enthusiasts. Cloud computing cynics are not your average conspiracy theory fans. Some of them are people with valued opinion in the public domain. Whatever they say—whether professional or personal opinion—counts as law for most people.

There are also those who want to protect the status quo. This is in fact the largest group of those who are responsible for the slow progress of cloud computing adoption. Many opinion makers, IT decision makers, and business managers fall into this category. In an effort to hold on to the ownership of physical resources—for which they trained for years—they find it hard to let go. This means businesses have reservations about adopting efficient technology like cloud computing.

Cloud computing technology disagreements

Cloud computing still has a long way to go. There are several identifiable problems, gaps, and mishaps. All these play a negative role in its progress. Privacy is the main problem. Analysts, public sector activists, and others criticize the lack of privacy for cloud-stored data. The perception is that the cloud computing providers are privy to other company’s secret information. Even if not directly, this information could fall in the hands of the wrong individuals. Or rather, a company could use or sell that information for its benefit. All this is possible and can be in the detriment of a corporation at the center of such breach. Though speculative, such perception has serious implications on cloud computing progress.

There are concerns about security of the information stored or exchanged in the cloud. Data backup issues, high costs of setup, and long-term progress of cloud computing are also contentious for most potential users of the cloud services.

Weak cloud computing legal frameworks

The legal frameworks for cloud computing are lackluster at best, in most countries. Factors relating to cloud computing contracts, duties, and responsibilities for all these have yet to be made standard. In some countries, cloud computing is still alien. There are different legal perspectives, suggestions, propositions, and analogies around the legalities of the cloud.

Since business entities already have legal frameworks that have been working for them for years, cloud computing is still not ripe for them. This, coupled with the lack of basic standards for total vetting of both providers and tenants of the cloud, makes progress slow.

The above are just some of the common issues hampering cloud computing progress. Even then, there are those who are who still manage to move on despite the above mishaps.

By Walter Bailey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…