Hybrid Washing: What’s Real; What’s Not?

Hybrid Washing

It is a well-known fact in the business of marketing a product that to get a customer’s attention you must do one or all of the following:

  • first make it clear that without this product a customer stands to lose out somehow;
  • second make it clear this product is better than anything that has preceded it;
  • third, make it clear that this product will save money, make money or make the customer somehow more attractive;
  • fourth, make it clear that this product is better than any competitors’ products;
  • fifth, make it clear that if the customer does not buy now, the opportunity will pass them by; and
  • sixth, make it appear that your product is actually new and improved, even if it isn’t.

This last item might be the most troubling of all, since it tends to take a customer’s credulity along for a ride. Terms such as “green,” “no trans-fats,” “better mileage,” “calorie-reduced,” or “redesigned from the ground up,” lead customers to believe what they truly want to believe, regardless of actual details.

This phenomenon is not restricted to consumer goods; it also exists in the cloud industry, where confusion over terms such as public cloud, private cloud, hybrid cloud and managed cloud, clash with customers’ inherent fears over security, data loss and uptime, inside of which less scrupulous IT vendors can operate without challenge.

CloudWashing

In the bricks and mortar world, an intentional misrepresentation of a product by glossing up the exterior is often called whitewashing, and subsequently that same activity in the virtual world has been given the term cloudwashing.

The term hybrid, for example, has become the catch-all term that many vendors use to persuade customers that their data will move between private and public clouds seamlessly, but according to many in the cloud business, it just doesn’t happen like that. Simply re-branding an existing service by slapping the term “cloud” or “hybrid” in front of it is not close enough.

Understanding Terminologies

It is important that IT professionals get their terminologies straight, when contemplating a move to the cloud. Many times, what appears to be a move to the cloud turns out to be simply outsourcing to another storage company. To truly be cloud based, there must be multi-tenant architecture, virtualization and scalability, so that the client can capitalize on the use of a dynamic system that moves and flexes with the company’s particular needs. Multi-tenancy means you are one of many customers sharing the up-to-date resources of a cloud provider.

Terence Ngai, Head of Cloud Delivery Management at Hewlett-Packard, agrees. “No wonder customers are confused,” he states, “many vendors in the cloud market are deliberately applying terms like ‘hybrid’ and ‘open’ loosely to describe their offerings. When you read the fine prints of their collaterals, you might find different definitions of the terms they use. Some vendors will describe their On-Premises and off-premises offerings as hybrid while they are completely isolated with no interoperability between those offerings. Customers cannot have one service running on-premises talking to or exchange data with another service off-premises. Some vendors claim interoperability between their offerings as long as you use their technology stack only. How flexible is that?

Ngai adds, “The true definition of hybrid is having multiple service delivery models working together as if they are one environment that delivers application interoperability and portability, while supporting multi-vendor technologies. That is how customers can realize the true benefits of hybrid IT – agility, flexibility and no vendor lock-in.”

For a customer to attain true “hybrid cloud,” a good deal of work has to be done, and the right technology has to be installed. There needs to be full cooperation between the on-premises and off-premises systems, and beyond the technology, there must also be clear policies established as to what data goes where.

Sadly, hybrid washing and cloudwashing continue to exist, but just like any other venture, whether commercial or even between individual people, it is very easy for someone who wants to sell something to say what needs to be said in order to make the sale. In the business of cloud technology a great many terms come and go and get intertwined. Ultimately a customer must do the research to seek out vendors and suppliers who can be trusted and who can prove they can be trusted. And on top of that, there must always be a layer of caveat emptor – let the buyer beware.

This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter.

By Steve Prentice

Bitcoin electricity
Bitcoin Heating? Bitcoin mining or cryptocurrency mining has been widely vilified for it’s environmental impact. Why it does draw a huge amount of energy, more and more of it is coming from renewable sources and ...
Jim Fagan
Subsea Connectivity Digital transformation and the migration of data and applications to the cloud is a global phenomenon. While we may like to think that the cloud knows no borders, the reality is that geopolitics ...
Jonathan Custance
IoT and cloud computing are on the increase High-profile cybersecurity breaches are increasingly in the news, a prime example being the NHS incident of May 2017 when services were brought to a standstill for several ...
David Dymko
Working with virtual machines and or Kubernetes A conversation with David Dymko, Director of Engineering for Cloud Native Development at Vultr.com If you work with virtual machines and or Kubernetes, and if you have some ...
Brian Rue
What’s Holding DevOps Back And How Developers and Businesses Can Vault Forward to Improve and Succeed Developers spend a lot of valuable time – sometimes after being woken up in the middle of the night ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.