Cloud Predictions For The New Year

Cloud Predictions for the New Year

Making predictions for the coming year has become a time-honored tradition in the tech field, so I thought we’d have a little fun with it here at CloudTweaks by predicting what’s not going to happen.

1. Amazon won’t continue to be synonymous with the cloud.

EC2 and S3 are popular and established, but they’re seeing mounting competition from Microsoft, Google, HP, IBM, telcoms, and a number of smaller providers. Plus, Amazon seems far more interested in devices and apps lately — as it should be.

2. Apple won’t be successful in the cloud.

The new iTunes is a mess when it comes to iCloud, and Apple hasn’t offered up any other cloud products. Microsoft and Google definitely have Apple beat when it comes to anything “-aaS.” (It’s nice to see Apple getting beat in something.)

3. Marketing Windows 8 as a “cloud OS” won’t work.

Windows 8 may very well succeed (I actually like it myself), but it won’t be on the merits of its cloud-iness. Having settings sync across devices is great, but that’s invisible to most users. And SkyDrive integration is also nice, but SkyDrive desktop integration requires a separate download most people don’t know about. Yawn.

4. Big Telecom won’t be able to recapture market share lost to the cloud.

Industry stalwarts like Skype and Google Voice, as well as a wide variety of inexpensive cloud-based VoIP providers, are giving big telecommunications company a run for their money. There’s no way Verizon, AT&T, Time Warner, or anyone else can make up for lost ground. At least not in 2013 — and probably not ever.

5. None of the biggest cloud providers will get hacked.

Amazon, Google, IBM, Microsoft, HP, Dell, Facebook, and Yahoo! will all continue to maintain highly secure data centers and SaaS platforms. While customers may bungle their own security — Password1 anyone? — these companies will keep hackers away from their systems.

By Robert Shaw

About Robert

Robert Shaw was an early entrant into the cloud computing sector, working as a consultant for Accenture on server virtualization and software-as-a-service migration. He has also been a technical editor for eHow and other web properties and still provides local IT consulting services.

View All Articles

Sorry, comments are closed for this post.

Comics
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…