Gartner Cloud Prediction Places US Top In Public Deployment

Gartner Cloud Prediction Places US Top in Public Deployment

Trying to predict the cloud market can easily be likened to attempting to look for sufficient, clean drinking water in the Atacama Desert. All the same Gartner tries its best to tear through the numbers and somehow comes up with facts and figures that shape up the kind of predictions that business professionals and leaders can rely on to position their strategies.

For 2013, Gartner has come out, this time round focusing its lofty analytical eyes on the public cloud segment and concluding that it will scale up with a growth rate that will not miss the 18.5 percentage figure by any wide margin. The market will predictably hit $131 billion by 2017, a climb of some $20 billion from the 2012 figures which were quoted at $111 billion.

Some of the areas that Gartner considers under the public cloud include Infrastructure as a Service (IaaS), and other cloud services based on the likes of OpenStack. IaaS, file and storage are quickly emerging as the cheetahs of public cloud, growing at a near 50 percent rate of 42.4 percent through 2012 to hit $6.1 billion. If the growth of 2012 is shocking, 2013 will burst it all out with the predicted growth forgiving the 50 percent mark by less than three points to rest at 47.3 percent, representing $9 billion by the close of 2013.


Cloud-driven advertising The phenomenon of cloud-driven advertising has also sneaked into Gartner’s 2013 predictions. Suspects like Salesforce will no doubt have a good share of whatever loot comes out of this dimensions that are now finding a way into the online advertising industry. In its characteristic style of not leaving any stone unturned, Gartner has attempted to define cloud advertising terming it a collection of processes that support the selection, transaction, and delivery of advertising and ad-related data where content and price are determined at the time of end user access, usually by an auction mechanism that matches bidders and impressions as they become available.” The data cruncher (Gartner) also gives a list of what it calls relevant vendors, again featuring familiar suspects including Apple, AOL, Facebook, Google, Baidu, Microsoft, Yahoo, OpenX, and AppNexus.

Among all regions under Gartner’s ‘cloud-scope’, North America sticks out its neck as the most exciting consumer of public cloud services, expected to generate 59 percent of all the money that will be spent in the larger public cloud service segment right from 2013 all the way to 2016. This is not to say that Western Europe, a region equally known to understand the importance of cloud computing has been left behind, only that its predicted percentage consumption is way below that demonstrated by North America. All the same Eastern Europe manages to pull a spirited fight that makes up for 24 percent of the overall spending, placing it right behind North America.

Emerging markets? This is where the fastest growth will be seen shooting up, particularly in China, India and Indonesia where the vast populations will unquestionably have something to do with any upset that may be witnessed in these figures come the next Gartner release.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…