Presenting The Cloud A Subcategory To Connect With Clients

Presenting The Cloud A Subcategory To Connect With Clients

Last week I heard a newscaster announce that the, “cloud” overhanging the economy revolves around what our legislators are going to do about the fiscal cliff. This terminology has nothing to do with the topic of cloud computing but everything to do with our audience’s mental reflexes when it comes to associating common, “cloud” usage classifications with cloud computing.

Everyone understands that cloud computing is not the visible collection of water or ice particles in the air http://dictionary.reference.com/browse/cloud?s=t but when their cognitive processes engages the word cloud the associations made are much like the newscasters usage. This creates insecurity in an industry where security is the paramount concern. Other words that come up in the dictionary.com reference above include smoke, dust, dim, obscure, darkens, gloom, trouble, and suspicion. Even if car manufactures produced a car that could fly it could never be named, “the Cloud”. It isn’t until definition number eight that cloud computing is mentioned on the dictionary.com site and many dictionaries don’t even include a computing reference. This hurdle will be overcome by presenting the cloud as a subcategory.

Categories are More Important Than Definitions

It’s inconvenient for the human brain to adjust to a different definition of a word that already exists in our categorical rendering of it. This is explained by Yamauchi & Markman’s, (2000) finding that categories serve as organizers of knowledge. Since our knowledge is organized according to these categorical hierarchies, defining cloud computing is a little like my wife hiding treats in the vegetable drawer in our refrigerator. The kids know the treats are there but they can’t find it. Similarly, our brains recognize the context of cloud computing but are not grasping the full meaning without a pre-existing bias. When cloud computing filters into our mind set alongside idioms like, absent-mindedness and, lost in reverie is it any wonder that security concerns are raised?

Creating a New Category?

Cognitive science again and again points out that our learning is tied up in grouping similar concepts together. Applying this concept practically means that cloud computing is faced with the task of going beyond redefining a term, which could take a long time, and creating a category that differentiates itself from common current connotations.

When I moved from the northern part of the US to the south I was immediately branded as a northerner when I said, “pop” in reference to a soft drink. In the south, “coke” is a regionalism for all soft drinks. This is quite a victory for Coke and its marketing team who created a new category based on their brand name.

By tearing a page out of Coke’s playbook perhaps one of us can figure out how to make the cloud synonymous with safety just like a mouse is no longer limited to something scurrying across the floor.

By Don Cleveland

References: Yamauchi, T., & Markman, A. B. (2000). Inference using categories. Journal Of Experimental Psychology: Learning, Memory, And Cognition, 26(3), 776-795. doi:10.1037/0278-7393.26.3.776

About don

Although relatively new to technology writing Don Cleveland has been writing and working in the fields of business and psychology over the last 25 years. After earning his B.A. in psychology at the University of South Florida he has returned to finish an M.A. in counseling. His passions are shining psychology’s empirical light on the world of computing and work through research and writing.

View All Articles

Sorry, comments are closed for this post.

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…