It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

Earlier in the month I talked about Bouillabaisse a fish stew or as I called it Cloud Bouillabaisse both are heavily reliant on what you put in it. Building on that food theme (I have to stop writing these blogs at dinner time…) I would like to talk about cloud pizza this time. But in this case we aren’t making the food we are ordering it.

ToppingsChicago-Style-Pizza

The typical pizza place offers a variety of options. Depending on the type and nature of the pizza (Chicago style that is real pizza and then New York style which is more like saltines with ketchup on them. Ouch!) you can choose the types of cheese and the various toppings. Depending on the establishment, you can order pizza with Gyros meat, or pizza with fresh basil or if you have the budget, pizza with Caviar . Once you pick the toppings you can even pick the sauce at many places as they offer white sauce, red sauce and even the no sauce at all option. (Image Source: http://en.wikipedia.org/wiki/Chicago-style_pizza)

Pricing

You start picking the components you want on your Pizza. It’s very similar to what you do when you look at various Cloud Service Providers. They offer you a pick list of options. From the number of processors to the amount of network bandwidth, you plan to consume you can customize everything. So the pricing can be confusing at times. That’s why they offer you calculators so when you do review the pricing, it all comes together neatly so you can quickly check out.

Are You Sure?

What’s sometimes missing is the intelligence of the smart person working at the CSP who truly understands your needs and can put together a viable solution which help you. That Pizza delivery person that has been to your house 100 times and knows that one of you loves white sauce but not all of you. So if the order has five white sauce pizza’s rather than just the one, make sure the smart delivery person calls and says “are you sure?

A cloud “Are you sure?” button would factor in not only the things you have purchased in the past, but also an understanding of your organizational goals. Let’s call it a cloud picker. The”Are you sure?” button would encompass first off only those things your organization has in their catalog today. Following the ITIL Service Catalog model we would make sure that only those things IT can support today are available on the “Are you sure” page. We would need some form of validation (user) and validation (project). That should probably be a barrier to entry. Rather than allowing someone all the way to the checkout page we verify that they can start the process first. In the Pizza delivery world that is the range delivery folks are willing to travel (no more than 3 miles from the store etcetera…). So first, we verify the user in question is in the delivery zone.

Once we know we can deliver the pizza we then verify that the user is who they say they are (authorization and authentication). We can then walk them through a much simplified ordering process for what they need. Then they click place an order. We show them a simple page that starts off with ARE YOU SURE?. Below that we show them the capabilities they are ordering (to confirm). We can then launch the pizza into the oven. From there it is only 30 minutes or so to dinner.

Unless of course we made a mistake and in the final check we get an ARE YOU SURE? Call. It’s important that we have a validation process just in case someone isn’t paying attention. It’s also important to know that our CSP is also paying attention.

By Scott Anderson

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud – And Lost

5 Companies That Took On The Small Business Cloud The growth of cloud based business support systems has been staggering, and while some major software houses have quickly positioned themselves as forerunners in the move to the Cloud, there are several high-flying companies that have so far failed to provide small businesses with the level…

Banking On Recurring Revenue In The Cloud

Banking On Recurring Revenue In The Cloud

Recurring Revenue In The Cloud Many common traditions have held up for centuries (Thanksgiving dinner, anyone?), but the post millennial world of business and technology has perennially followed the idea that traditions are meant to be broken. Take a look at the radical change in the way content is consumed.Traditionally, cell phones were used as…

From Illusion To Reality: Up Personal On Cloud Computing Privacy

From Illusion To Reality: Up Personal On Cloud Computing Privacy

Cloud Computing Privacy We are under an illusion around the cloud computing. Without a doubt the benefits are incredible. However, cloud impacts personal user privacy and potentially exposes their private data in ways they may not have anticipated. Given that users don’t usually read the terms of service and privacy policies, it is unclear how…

Are You Sure You Are Ready For The Cloud?: Cloud as a Datacenter

Are You Sure You Are Ready For The Cloud?: Cloud as a Datacenter

Cloud as a Datacenter Through my job as a Cloud Architect during the day, I run into a lot of scenarios that I think would be important to write about. Not that they are of major importance to others, but a way for people to learn from real world experience. This month, it had to…

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

What The FITARA Scorecard Tells Us About Government Cyber Security Preparedness

Government Cyber Security Preparedness Last year’s massive data breach of Office of Personnel Management, as well as other recent cyber security incidents affecting federal agencies, underscored the urgency of bringing the federal government’s security infrastructure up to date. Although many agencies have made strides toward hardening their cyber security, outdated IT infrastructure and architecture is…

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones From Apple, Samsung and HTC Promise To Light Up 2016

New Smartphones from Apple, Samsung and HTC (Sponsored post courtesy of Verizon Wireless) The launch of the Galaxy S7 Edge at the Mobile World Congress in Barcelona during February was the first shot in a vintage year for mobile phones. The S7 is an incredible piece of hardware, but launches from HTC and Apple later in the…

Featured Sponsored Articles
How Successful Businesses Ensure Quality Team Communication

How Successful Businesses Ensure Quality Team Communication

Quality Team Communication  (Sponsored post courtesy of Hubgets) Successful team communication and collaboration are as vital to project and overall business success as the quality of products and services an organization develops. We rely on a host of business tools to ensure appropriate customer interactions, sound product manufacturing, and smooth back-end operations. However, the interpersonal relationships…

Featured Sponsored Articles
How To Develop A Business Continuity Plan Using Internet Performance Management

How To Develop A Business Continuity Plan Using Internet Performance Management

Internet Performance Management Planning CDN Performance Series Provided By Dyn In our previous post, we laid out the problems of business continuity and Internet Performance Management in today’s online environment.  In this article, we will take a look at some of the ways you can use traffic steering capabilities to execute business continuity planning and…

Featured Sponsored Articles

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor