Invisible Computing: How Cloud Is Forcing Software And Hardware Apart

Invisible Computing: How Cloud Is Forcing Software And Hardware Apart

Invisible Computing: How Cloud Is Forcing Software And Hardware Apart

By 2018, Gartner predicts that 70 per cent of professionals will conduct their work on personal mobile devices, enabled by the revolutionary concept of cloud computing.

Cloud computing essentially separates software from the logical functionality of local hardware. In other words, instead of needing computing power to be housed locally, major computing functions will instead be accessible from afar, usually via the Internet.

The obvious benefit here is that risk of ownership of software is eliminated, as well as the need to hire in-house resources to service them.

What will this do to the market?

In the case of hardware, cloud computing is likely to open the market up by lowering barriers to entry for manufacturing. The recent emergence of Bring Your Own Device (BYOD) in the workplace presents renewed scope and opportunity for the hardware market, as by 2016, 38 per cent of businesses expect to stop providing devices to staff, allowing them instead to select their own.

The real question is how cloud computing will fundamentally alter the landscape of the software market. Ever since computers have been adopted for wide scale use in offices, the market has largely operated in the same way. That is to say, businesses have always owned the software that they use.

The switch to cloud computing poses major challenges for software providers in that:

  • They will need to reconsider how their products are designed to ensure optimum functionality via cloud hosting, and;

  • They will need to deal with hugely disruptive business model changes; the lump-sum software sales prices and annual maintenance fees that software creators are used to will have to be converted into monthly subscription fees, distributed at a different pace to what they’re accustomed to.

In addition, customers will pay only for the software and service they actually use, rather than licensing the whole package. What isn’t yet clear is the extent of these financial implications for software providers.

What will this mean for business?

security-byod

Businesses will effectively be shifting expense from capital to operational, typically with little to no upfront costs. They will also save considerable time and space by no longer needing to house and maintain their own server.

But perhaps more interestingly, as software drifts apart from hardware, businesses’ ability to map infrastructure will become a thing of the past. In fact, when software is accessed via cloud services, activity will take place in a highly abstract space. This is quite revolutionary for business practise and is already raising questions of security.

Cybercriminals are always one step ahead in developing new ways to abuse the online community, and experts predict that cloud computing will be no different. However, well-established Hosting providers should be able to make assurances about their security policy and when implemented with due care, cloud-based technology can offer a wealth of benefits to the business world.

By Ali Raza,

This guest blog is written by Ali Raza on behalf of http://www.interoute-iam.com. Ali is a very keen blogger and writes content to please the audience and to add value to their lives. In his free time, Ali likes to get things ticked off from his bucket list.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid: Utopia Comes To Tech

The Open Performance Grid “For what greater wealth can there be than cheerfulness, peace of mind, and freedom from anxiety?” So wrote the English author and philosopher Sir Thomas More in his novel, Utopia, almost 500 years ago. More’s utopian dreams continue to thrive in one guise or another to the present day; in the…

Hoarders And Data Collectors:  On The Brink Of Unmanageability

Hoarders And Data Collectors: On The Brink Of Unmanageability

Hoarders and Data Collectors In our physical world, hoarders are deemed “out of control” when they collect too much.  Surely the same analogy applies in our online world.  When providers collect realms of data from us, it seems they lose control of that too?  In the last months it’s not just the frequency of data…

The iCloud Scandal – Who Is To Blame? –  ‘Cloud’ Security vs. ‘Internet’ Security

The iCloud Scandal – Who Is To Blame? – ‘Cloud’ Security vs. ‘Internet’ Security

How the iCloud Scandal Has Helped to Define the Difference Between ‘Cloud’ Security and ‘Internet’ Security Busting the myth that bad cloud security was to blame for Apple’s recent celebrity data disaster Overview: We discuss the ‘celebrity hacking’ iCloud saga and debate whether or not the breach was likely down to Cloud encryption issues or…

Did The FBI Make A Mistake In Publicly Fighting Apple?

Did The FBI Make A Mistake In Publicly Fighting Apple?

Dropping The Gloves: The FBI vs Apple Unless you live in a completely disconnected bubble, you’ve heard all about the recent battle between Apple and the FBI. You’ve heard the arguments from different sides —you’ve probably even debated on one side or the other. Some argued that Apple was right because nothing should come above…

Global Cloud Development An Open Question

Global Cloud Development An Open Question

Global Cloud Development Statistics and projections from Cisco’s Global Cloud Index show that the world’s data centers are already processing 4.7 zettabytes (4.7 million petabytes) per year. Cisco research says this amount will continue to grow by 23% annually for the next few years. (Inforgraphic Source: https://visual.ly/how-much-petabyte) If we project these numbers over the next 25…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor