The Next Wave Of Cloud Computing

The Next Wave Of Cloud Computing

Next Tech Wave

Cloud adoption at the enterprise level requires that cloud vendors deliver on enterprise-class reliability, security, and management.  While service levels for cloud computing are competitive with most companies’ on-premise datacenters, concerns about security will drive enterprise-scale organizations to choose to deploy hybrid-cloud applications.  Hybrid-cloud in turn creates new distributed application management challenges.  The move to hybrid-cloud for larger organizations with complex applications will depend on vendors’ ability to deliver comprehensive application management that spans across both cloud and datacenter environments.

Reliability — Table Stakes for Cloud Offerings

The Software-as-a-Service market has established that cloud-based delivery of software can be routine.  Major vendors (Amazon Web Services (AWS) and Microsoft Azure) have set the standard for reliability for Infrastructure-as-a-Service that has driven the early growth of cloud computing services. While there have been a number of high-profile outages, AWS and Azure have consistently delivered service levels that rival or beat those of on-premise datacenters. Other cloud vendors —Rackspace, Terremark, plus a growing crowd of additional entrants — are offering similar service levels.

Security — Driving Hybrid Cloud Adoption

Much early cloud adoption has been driven by application development and quality and assurance organizations.  But production systems – particularly those in sensitive industries – are another story.  CIOs have the mandate to protect sensitive information like credit card numbers, patient records, or proprietary business processes. Many organizations are bound by regulatory requirements that govern how they store and protect data, like HIPAA rules in the healthcare field.

To address these security concerns and still capture the efficiency and flexibility benefits offered by cloud deployments, companies will look to Hybrid Cloud models. Hybrid Cloud is perfect for the enterprise — front-end application components have Cloud scalability while back-end data-stores remain secure on-premise.

Monitoring — The Gateway to Hybrid Cloud

gives the enterprise the scalability of the cloud and alleviates concerns about reliability and security. But, Hybrid Cloud presents a new challenge: interconnected applications are harder to monitor. Unless monitoring tools change to solve this problem, enterprise IT will not embrace the Cloud.

Applications represent critical business functions for companies, so IT needs to monitor them comprehensively for problems. But, Hybrid Cloud creates a broken monitoring view. Most Cloud service vendors provide tools to track cloud systems, while most IT teams use their own tools to track on-premise servers. Neither is well equipped to provide comprehensive monitoring that spans across both cloud and datacenter-deployed application components.

To solve this problem, monitoring systems must evolve to give a unified view of the entire Hybrid Cloud. They must show IT teams where performance breakdowns are occurring across both the Cloud and the datacenter. They must treat Hybrid Cloud as one engine, with all systems firing to deliver a positive user experience.

vic-nymanBy Vic Nyman,

Vic Nyman is the co-founder and COO of BlueStripe Software. Vic has over 20 years of experience in systems management and APM and has held leadership positions at Wily Technology, IBM Tivoli, and Relicore/Symantec.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…