The Future Of Cloud, And The Future Of Your Company

The future of cloud

Recently the unofficial comedy team of Jimmy Kimmel and Justin Timberlake performed a short skit that illustrated how silly hashtags sound when inserted into normal conversation.

The idea of punctuating a sentence with keywords intended as flags-to-be-found is of course, ludicrous in spoken parlance, but as Shakespeare and Chaucer both wrote, many a truth is spoken in jest. The humor of the Kimmel/Timberlake skit underlies a very real truth that language, just like culture and life itself, is morphing to accommodate a new way of being, and written language is now expected to be seen online, where interaction is expected and where calls-to-action through hashtags and twitter mentions are essential.

These cultural references demonstrate that the age of the cloud is here. Everything exists “out there,” in an instantaneous and globally ubiquitous fashion. Such an observation is not limited to technologies of course. The same customer mindset that expects free wi-fi at every street corner and free apps for its numerous connected devices, is not going to easily file into a boardroom for a staid two-hour meeting whose format has not changed since the 1960’s. Nor will it sit on a website that takes more than a second to process or update. Nor will it stay loyal to anything, when it knows there is something better, cheaper and easier just a hand-swipe away.

These are the concepts that decision-makers should look at when they consider “the cloud” and its potential for the year to come. The cloud is not so much an alternative format for storing and distributing data; it had become instead a metaphor for everything that people do: soft-edged, amorphous and constantly moving.

Cloud mentality could be considered a strategy, a modern descendant of older business terms such as agility and continuous improvement, but now with a more pressing deadline of “now.” Change, customer service, innovation – these things must all happen within minutes or seconds of an online request or a comment on Twitter. Employees, the good ones, the bright ones, know better than to wait for years for the politics of promotion to tap them on the shoulder; there is freelance work to be had. There are start-ups. There is always something new and interesting around the corner that will attract the thinkers, the doers and the innovators.

In 2014 the cloud might truly come of age. More and more organizations are converting their legacy systems to cloud-based ones, whether public, private or hybrid. The personal cloud is also rising fast, with iCloud, Evernote and DropBox demonstrating just how easy and reliable it can be for the average user.

In November of this year, CloudTweaks will be partnering with Fortune Magazine to publish a special insert on the cloud in 2014. Our intention is to demonstrate not only how the technology is moving ahead as a computing platform, but also as a social and commercial sea-change. What worked in the age of the paper memo does not work so well in the age of Twitter. As always our writers will be there to comment explore and question what this means for your organization and those around the block and around the world who are connected to you.

Where will we be a year from now? Will BlackBerry rise from its ashes? Will Android swallow the smartphone market? Will the economy recover enough to hire back all the people who need to work? Where will the work be? None of us has a crystal ball, of course. That would make things very easy indeed. But in the absence of such clairvoyance, we can rely on some truths nonetheless. First, people will continue to seek innovation, ease-of-use and reliability. Companies will seek cost savings and methods to connect with the customer. And things will generally continue to get smaller, faster, cheaper, and possibly more integrated into the human body itself. Google Glass, anyone? That is actually what “cloud” represents.

By Steve Prentice

Kelly Dyer
Achieving Data Security Compliance As individuals, we go through life sharing information about ourselves in every aspect of our daily existence. From credit checks for securing a loan, through to entire personal and family medical ...
Threat Security
Azure Red Hat OpenShift: What You Should Know What Is Azure Red Hat OpenShift? Red Hat OpenShift provides a Kubernetes platform for enterprises. Azure Red Hat OpenShift permits you to deploy fully-managed OpenShift clusters in ...
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...
Alex Vakulov
Ransomware Database Targeting The scourge of ransomware is undoubtedly the most severe cyber security concern for home users and organizations these days. It revolves around taking important data hostage and demanding money, usually hard-to-trace cryptocurrency ...
Gary Bernstein
Secure Remote Authentication When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.