It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

It’s Not Delivery, Its Cloud

Earlier in the month I talked about Bouillabaisse a fish stew or as I called it Cloud Bouillabaisse both are heavily reliant on what you put in it. Building on that food theme (I have to stop writing these blogs at dinner time…) I would like to talk about cloud pizza this time. But in this case we aren’t making the food we are ordering it.

ToppingsChicago-Style-Pizza

The typical pizza place offers a variety of options. Depending on the type and nature of the pizza (Chicago style that is real pizza and then New York style which is more like saltines with ketchup on them. Ouch!) you can choose the types of cheese and the various toppings. Depending on the establishment, you can order pizza with Gyros meat, or pizza with fresh basil or if you have the budget, pizza with Caviar . Once you pick the toppings you can even pick the sauce at many places as they offer white sauce, red sauce and even the no sauce at all option. (Image Source: http://en.wikipedia.org/wiki/Chicago-style_pizza)

Pricing

You start picking the components you want on your Pizza. It’s very similar to what you do when you look at various Cloud Service Providers. They offer you a pick list of options. From the number of processors to the amount of network bandwidth, you plan to consume you can customize everything. So the pricing can be confusing at times. That’s why they offer you calculators so when you do review the pricing, it all comes together neatly so you can quickly check out.

Are You Sure?

What’s sometimes missing is the intelligence of the smart person working at the CSP who truly understands your needs and can put together a viable solution which help you. That Pizza delivery person that has been to your house 100 times and knows that one of you loves white sauce but not all of you. So if the order has five white sauce pizza’s rather than just the one, make sure the smart delivery person calls and says “are you sure?

A cloud “Are you sure?” button would factor in not only the things you have purchased in the past, but also an understanding of your organizational goals. Let’s call it a cloud picker. The”Are you sure?” button would encompass first off only those things your organization has in their catalog today. Following the ITIL Service Catalog model we would make sure that only those things IT can support today are available on the “Are you sure” page. We would need some form of validation (user) and validation (project). That should probably be a barrier to entry. Rather than allowing someone all the way to the checkout page we verify that they can start the process first. In the Pizza delivery world that is the range delivery folks are willing to travel (no more than 3 miles from the store etcetera…). So first, we verify the user in question is in the delivery zone.

Once we know we can deliver the pizza we then verify that the user is who they say they are (authorization and authentication). We can then walk them through a much simplified ordering process for what they need. Then they click place an order. We show them a simple page that starts off with ARE YOU SURE?. Below that we show them the capabilities they are ordering (to confirm). We can then launch the pizza into the oven. From there it is only 30 minutes or so to dinner.

Unless of course we made a mistake and in the final check we get an ARE YOU SURE? Call. It’s important that we have a validation process just in case someone isn’t paying attention. It’s also important to know that our CSP is also paying attention.

By Scott Anderson

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Comics
What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about three hours of service outage. The attack was orchestrated using a botnet of connected devices including a large number of webcams…

Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from the galaxy far, far away that are affecting the ways businesses will do IT in our world in 2017. And…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with dropping storage costs, constantly improving bandwidth and computing performance, and consumers’ ever-growing personal digital libraries, online storage (profitable or otherwise)…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy and the way they were clearly leveraging the world of social, mobile analytics and cloud. So I mentioned to our…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical configurations. The smart network layer may be the leading component that is tasked with the need to automatically learn the…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago. The market persevered, weathering the “end of perimeter security” claims and adapting to become more flexible and dynamic, reaching beyond…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and business on a large scale cannot function without all business partners having access to the technology. But with eye interaction…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this question: how in the world do you eat cloud software? Cybersecurity today seems to have an unfortunate Catch-22. You want…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right? Everything going well, your…