It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

Earlier in the month I talked about Bouillabaisse a fish stew or as I called it Cloud Bouillabaisse both are heavily reliant on what you put in it. Building on that food theme (I have to stop writing these blogs at dinner time…) I would like to talk about cloud pizza this time. But in this case we aren’t making the food we are ordering it.

ToppingsChicago-Style-Pizza

The typical pizza place offers a variety of options. Depending on the type and nature of the pizza (Chicago style that is real pizza and then New York style which is more like saltines with ketchup on them. Ouch!) you can choose the types of cheese and the various toppings. Depending on the establishment, you can order pizza with Gyros meat, or pizza with fresh basil or if you have the budget, pizza with Caviar . Once you pick the toppings you can even pick the sauce at many places as they offer white sauce, red sauce and even the no sauce at all option. (Image Source: http://en.wikipedia.org/wiki/Chicago-style_pizza)

Pricing

You start picking the components you want on your Pizza. It’s very similar to what you do when you look at various Cloud Service Providers. They offer you a pick list of options. From the number of processors to the amount of network bandwidth, you plan to consume you can customize everything. So the pricing can be confusing at times. That’s why they offer you calculators so when you do review the pricing, it all comes together neatly so you can quickly check out.

Are You Sure?

What’s sometimes missing is the intelligence of the smart person working at the CSP who truly understands your needs and can put together a viable solution which help you. That Pizza delivery person that has been to your house 100 times and knows that one of you loves white sauce but not all of you. So if the order has five white sauce pizza’s rather than just the one, make sure the smart delivery person calls and says “are you sure?

A cloud “Are you sure?” button would factor in not only the things you have purchased in the past, but also an understanding of your organizational goals. Let’s call it a cloud picker. The”Are you sure?” button would encompass first off only those things your organization has in their catalog today. Following the ITIL Service Catalog model we would make sure that only those things IT can support today are available on the “Are you sure” page. We would need some form of validation (user) and validation (project). That should probably be a barrier to entry. Rather than allowing someone all the way to the checkout page we verify that they can start the process first. In the Pizza delivery world that is the range delivery folks are willing to travel (no more than 3 miles from the store etcetera…). So first, we verify the user in question is in the delivery zone.

Once we know we can deliver the pizza we then verify that the user is who they say they are (authorization and authentication). We can then walk them through a much simplified ordering process for what they need. Then they click place an order. We show them a simple page that starts off with ARE YOU SURE?. Below that we show them the capabilities they are ordering (to confirm). We can then launch the pizza into the oven. From there it is only 30 minutes or so to dinner.

Unless of course we made a mistake and in the final check we get an ARE YOU SURE? Call. It’s important that we have a validation process just in case someone isn’t paying attention. It’s also important to know that our CSP is also paying attention.

By Scott Anderson

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…