Pavlov And Cloud Computing: How We Will Overcome Our Anxiety

Pavlov and Cloud Computing: How We Will Overcome our Anxiety

It’s interesting to consider why we struggle to accept the cloud-computing model of data management. It seems safer to have our critical data and applications within walking distance from our desk where we can check its pulse anytime we want. Like Pavlov’s dogs we are conditioned to a react to whatever is a perceived as the non-threatening option. In this case one where we believe we must own the applications. After all we own our home, our vehicles, and our money. And yet even that is not the truth in its entirety.

For most of us the mortgage holder can be considered at least a part owner who requires us to have insurance and make payments. Vehicles are also financed and when we can’t make the payments we, “own” these lenders take the asset. If all of us decided to visit our money at the bank on the same day we would be disappointed yet we rest assured that the government has guaranteed it, and the banks are taking care of it. The point is that all of us do a lot more outsourcing than we are trained to believe. In fact every time we participate in online banking we are engaging in a form of cloud computing both literally in a technological sense, and figuratively in that we can never check on our money in the other room. This sounds like a, “cloud” philosophy.

What Pavlov Would Say

Based on the influential learning theories of Russian scientist Ivan Pavlov, its safe to assume he would tell us we have learned to trust an expensive form of ownership through classical conditioning. Pavlov conditioned dogs to salivate when they heard a bell much like we are conditioned to react guardedly when the cloud is suggested as a less expensive alternative than back room tech ownership. It is then that our, “owner reflex” kicks into gear and we feel insecure. Often this reaction is a reflection of a biased view toward ownership that produces the opposite paradigm than the ROI approach so necessary to a company’s success.

The Cost of Ownership

That house we own is an expensive proposition. Taxes, mortgage payments, maintenance, and other expenses arise that can make one doubt the value of this investment. Yet over the long haul home ownership has been a sound investment for most people. The history is far shorter in the tech industry. How many of us are working from a concrete financial analysis to assess cloud computing by the numbers? Often our initial reactions are conditioned responses to cloud computing until something happens to wake us from our slumber

When Pavlov’s assistant accidentally slammed a door during the bell ringing what came to be known as a, novel stimulus interrupted the dogs and they responded less. In the same way many of us will open up to the cloud when the novel stimulus of convenient, quick, and effective services are experienced.

By Don Cleveland

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…