Reasons Why Cloud Computing Remains Unpopular Past 2012

Reasons Why Cloud Computing Remains Unpopular Past 2012

There is no limit to what cloud computing can offer to individuals, corporations, academic institutions, and non-profit organizations. Cloud computing benefits cut across storage, working, communication, and so many other industries and functions. As yet, few people actually use it; or rather very few individuals are making the transition to it from the ‘inefficient, traditional and expensive’ forms or techniques.

These negative attitudes have been promoted by a number of reasons. Some are mere excuses where logic is called upon. Others are real concerns and thus form the basis of this article. People don’t use cloud computing for different reasons; and the most contentious ones include the following. According to most cloud computing industry experts, these could be the reasons why most people avoid cloud computing.

On top of the list is the cost of cloud cost computing. Premium and efficient cloud computing services remain costly for the regular business person and thus make uptake very slow or non-existent. Setting up, subscriptions, and service maintenance costs are high—so is the cost of doing business. Rather than setting up new systems at an extra expense, most businesses prefer operating on slow and inefficient systems which are (now) cheaper at maintenance level. Businesses don’t want an extra expense to devalue their present working servers, among a horde of other reasons. Of course, there is a valid opportunity cost explanation to justify why cloud computing is the cost efficient option in the long run. However, most businesses, small businesses especially, find this pretty hard to concur. As such, because of the cost debates, the adoption of cloud computing remains slow.

The second reason why cloud computing remains unpopular is because of security concerns. Security in the cloud continues to be a hot debate topic at most cloud computing conferences. There are hackers, thieves, and other malicious individuals who would benefit a lot from stolen data off cloud computing servers. Whereas most cloud computing providers offer some of the best security protocols that are difficult to bypass, people and businesses still have security concerns. These are measured on the basis of traditional businesses which have all their digital data stored within their premises; therefore, charging securing roles to a third, large party, is difficult.

Lastly, privacy is another big problem cloud computing faces, bringing a lot of negative publicity (hence, additional costs) to cloud computing industry. In a recent outburst, Steve Wozniak—Apple’s co-founder—stated that cloud computing would not be in the cosmos in the next five years, that it would become practically impossible to keep digital secrets because one firm will be having them!

These sentiments have been echoed elsewhere. Digital ownership will become a thing of the past. Of course where ownership is concerned, that’s enough for any self-caring person to avoid the technology. Overall, although some of these details are sensitive and scary, cloud computing remains a candidate as the technology to beat in the future.

By Walter Bailey

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms – What to look for in an EFSS Provider

The Cloud on Your Terms Your company has a mandate to go to the cloud and now it’s time to decide which services to use to help your business grow. You might be wearing several hats or you might be a dedicated IT professional and the responsibility has now been handed to you. So what…

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Utilizing Software Defined Networking (SDN)

Utilizing Software Defined Networking (SDN)

Software Defined Networking Winding down this year, we only have a couple of topics left: SDNs and SDI. Although SDNs are part of a solid SDI, we want to talk directly about it now. Many cloud management tools have the ability to create a virtual network. But creating a true VXLAN would require support of…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor