The Cloud Fragmentation – How To Work Together

The Cloud Fragmentation – How To Work Together

Cloud computing is rapidly gaining popularity and all major players in the industry are noticing. It is obvious that this paradigm will be the driving force for business in the coming decade mainly due to the proliferation of the internet and the mobile market space. This growth is quite substantial and looks to be still in a great state of change where new applications and technology will still be developed and introduced, and in no small part thanks to social media. Social media is really the driving force for all these technology as it is the ultimate information delivery platform. Web applications and even consumer electronic hardware are being developed around social networking and media, and all the data and information circulating around its ecosystem are growing larger each day. A lot of experts would probably disagree with me here, but I think that this is the Data Gravity dynamic that we see at play here; the information and data around social networking and media has grown immensely that its mass is attracting new services and technology towards it.

As with every coin, there are two sides to this phenomenon – a good and a bad. The good news is that this growth is a big sign of progress and will only usher in new developments and better technology for the end user, leading to more choices and healthy competition. But the bad side is unfortunately also creeping along those lines. Diversity is not always a good thing because it leads to complexity, and that is really bad most of the time. What I am getting to here is fragmentation, the sheer number of choices leads to confusion and compatibility issues especially for data format critical systems used in business. It’s all well and good for the end user, but business executives and CIO’s will be scratching their heads and pulling their beards trying to figure out ways to get around this problem. When you have multiple systems and each using a different cloud service from a different cloud service provider, you are positioning yourself in such a way that it becomes inevitable that you shoot yourself in the foot. Sure it would be easy to choose one provider and stick with it, but in the long run you may need the services of another, then another, and eventually you would need for all of those services to work together. And then BANG, shot in the foot. Two things will happen, one is that you (the company) cope and still stand on one leg while the other heal, or crumple into the ground dazed and unable to get up.

Because of the perceived profitability of cloud computing, all major players in the industry are quickly bringing their own flavor into the cloud including Google, Microsoft, HP, Amazon, IBM, Cisco, and VMWare to name but a few. Some of these companies are pioneers in the field but they still lend to the overall fragmentation. What this essentially means is that not all of the services that these companies and those like them offer are compatible, in any way, making it almost impossible to switch providers when the need arises. You will see data lock-ins being more prolific as service providers try and retain the customers they have. So they will try to find ways to make it hard for you to transfer your data to other providers, effectively making you a long term customer and forcing you to avail of other services.

This problem can be attributed to the lack of standards in the field, which can also be attributed to the fragmentation. It’s a vicious cycle that could collapse if not looked into soon. Let’s take for example, cell phones with Bluetooth, no matter who manufactured that phone, you can bet that it will be able to communicate with a phone made by another manufacturer 100% of the time barring service outages. This is because of standard communication protocols, which is sadly missing in cloud computing. Sure, it still uses the common networking protocols for communication, but the services themselves and how they are programmed and set up is not made to work with other services by other companies. It would take a lot of man-hours and considerable technical knowledge in order to migrate services and applications to other providers.

By Abdul Salam

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…