Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Breaking The Mold: Why IT Veterans Can’t Resist The Cloud

Why IT Veterans Can’t Resist the Cloud

Like it or not, Cloud Computing has transformed the way we communicate; from online storage to social networking, server virtualization truly pushes the boundaries of what is possible in a digitized world. Yet it was only a few years ago that the cloud was merely being used as a buzzword to describe specific web services hosted on shared web space. So what has changed? Cost, for one thing and availability for another; IT decision makers who once criticized the cloud may soon have to embrace it.

The Economics of Cloud Computing

A recent report in the economist wrote that small banking firms were expected to spend nearly $180 million on cloud services to better serve their clients. That means a global market for cloud services and availability is growing rapidly to support consumer demands, as well as expectations. Small banking firms can now host PDFs, email and other important financial documents on cloud storage platforms without having to invest in costly infrastructure. From a supply and demand standpoint the price of cloud based services can only get cheaper.

Lower costs reduce IT complexity and enable organizations to scale infrastructures depending on needs. That aforementioned small banking firm need not employ an entire IT department to maintain a virtual environment. Staff members may now work remotely allowing them to make the most of company resources – favorable attributes made possible by cloud-based resources. Even still, glitter isn’t gold amongst IT veterans who cannot make it past the shortcomings of the cloud. Gartner lists 3 key challenges for cloud computing: Security, governance and privacy for starters.

Security Risks

The threat of downtime is imminent to any organization reliant on cloud-based resources, particularly because cyber-attacks can render this virtual environment unresponsive. To most skeptics, security has become the main concern. At one end, you have the physical layer – a group of servers collocated within a secure location each partitioned to handle a certain amount of traffic, both upstream and downstream. The virtual end routes traffic to and from physical servers accordingly, but the more convoluted the signal path becomes (in theory) the more room for error exists.

Cloud environments are increasingly susceptible to DDoS (distributed denial of service attacks) because security protocols are easily bypassed by attackers at specific points of entry. Some organizations have gone as far as to implement a security appliance within the physical layer of a data center. Others simply rely on cloud security software, of which, can still be foiled by malicious attack. But aside from these obvious security pitfalls (that often beget other technologies), CTO’s still cannot and must not deny that the cloud computing business model works – and to an extent, works rather well considering its shortcomings. In fact, cloud based services are actually driving consumer trends faster than organizations can keep up.

Two Steps Forward One Step Back

Cloud’s popularity often outgrows infrastructure simply because it is cheap and everyone wants to offer a service to one-up the competition. What happens then is that companies partition more storage – enough to keep up with demand for the next few years, only to find that they’ve exceeded capacity in just a few short months. In that regard, cloud becomes a victim of its own success forcing IT decision makers back to the drawing board. Skeptics will still argue you cannot make a cloud environment secure as in a dedicated environment. Yet at this point there is no turning back. Clients, shareholders and customers expect to have specific IT resources at their fingertips, and as everyone runs to cloud based computing platforms, traditionalists must adapt or risk falling behind the times.

From an economic standpoint, cloud will continue to level the playing field for all types of IT vendors so long as organizations realize what their true cost of ownership is. If they aren’t utilizing their infrastructure efficiently they may be losing money by not outsourcing to a cloud provider such as, for example, AWS amazon web services. Whichever solution decision makers decide to stick with, one thing’s for certain; cloud product offerings will improve and costs will come down.

This is a post written by on behalf of Colocation America, a leading provider of data center services in Los Angeles.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

Customer Service Trends Customer service has become the new battleground in today’s marketplace. In fact, 97 percent of customers around the world now say that customer service makes a key difference in whether they decide to go with a brand or not, Microsoft reports. Many of the biggest changes in today’s customer service landscape center…

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…