Hybrid Washing: What’s Real; What’s Not?

Hybrid Washing

It is a well-known fact in the business of marketing a product that to get a customer’s attention you must do one or all of the following:

  • first make it clear that without this product a customer stands to lose out somehow;
  • second make it clear this product is better than anything that has preceded it;
  • third, make it clear that this product will save money, make money or make the customer somehow more attractive;
  • fourth, make it clear that this product is better than any competitors’ products;
  • fifth, make it clear that if the customer does not buy now, the opportunity will pass them by; and
  • sixth, make it appear that your product is actually new and improved, even if it isn’t.

This last item might be the most troubling of all, since it tends to take a customer’s credulity along for a ride. Terms such as “green,” “no trans-fats,” “better mileage,” “calorie-reduced,” or “redesigned from the ground up,” lead customers to believe what they truly want to believe, regardless of actual details.

This phenomenon is not restricted to consumer goods; it also exists in the cloud industry, where confusion over terms such as public cloud, private cloud, hybrid cloud and managed cloud, clash with customers’ inherent fears over security, data loss and uptime, inside of which less scrupulous IT vendors can operate without challenge.

CloudWashing

In the bricks and mortar world, an intentional misrepresentation of a product by glossing up the exterior is often called whitewashing, and subsequently that same activity in the virtual world has been given the term cloudwashing.

The term hybrid, for example, has become the catch-all term that many vendors use to persuade customers that their data will move between private and public clouds seamlessly, but according to many in the cloud business, it just doesn’t happen like that. Simply re-branding an existing service by slapping the term “cloud” or “hybrid” in front of it is not close enough.

Understanding Terminologies

It is important that IT professionals get their terminologies straight, when contemplating a move to the cloud. Many times, what appears to be a move to the cloud turns out to be simply outsourcing to another storage company. To truly be cloud based, there must be multi-tenant architecture, virtualization and scalability, so that the client can capitalize on the use of a dynamic system that moves and flexes with the company’s particular needs. Multi-tenancy means you are one of many customers sharing the up-to-date resources of a cloud provider.

Terence Ngai, Head of Cloud Delivery Management at Hewlett-Packard, agrees. “No wonder customers are confused,” he states, “many vendors in the cloud market are deliberately applying terms like ‘hybrid’ and ‘open’ loosely to describe their offerings. When you read the fine prints of their collaterals, you might find different definitions of the terms they use. Some vendors will describe their On-Premises and off-premises offerings as hybrid while they are completely isolated with no interoperability between those offerings. Customers cannot have one service running on-premises talking to or exchange data with another service off-premises. Some vendors claim interoperability between their offerings as long as you use their technology stack only. How flexible is that?

Ngai adds, “The true definition of hybrid is having multiple service delivery models working together as if they are one environment that delivers application interoperability and portability, while supporting multi-vendor technologies. That is how customers can realize the true benefits of hybrid IT – agility, flexibility and no vendor lock-in.”

For a customer to attain true “hybrid cloud,” a good deal of work has to be done, and the right technology has to be installed. There needs to be full cooperation between the on-premises and off-premises systems, and beyond the technology, there must also be clear policies established as to what data goes where.

Sadly, hybrid washing and cloudwashing continue to exist, but just like any other venture, whether commercial or even between individual people, it is very easy for someone who wants to sell something to say what needs to be said in order to make the sale. In the business of cloud technology a great many terms come and go and get intertwined. Ultimately a customer must do the research to seek out vendors and suppliers who can be trusted and who can prove they can be trusted. And on top of that, there must always be a layer of caveat emptor – let the buyer beware.

This post is sponsored by the Enterprise CIO Forum and HP’s Make It Matter.

By Steve Prentice

Martin Mendelsohn

The Growth of Third Party Risk Management (TPRM) Firms

Cybersecurity and the Continued Risks Back in the day, we played cops and robbers with sticks and plastic squirt guns.  Sometimes you were pursued, at other times you were the pursuer.  There wasn’t much more ...
Gilad David Maayan

Accessing (HPC) High Performance Computing

HPC in the Cloud Big data and Machine Learning (ML) can provide businesses with incredible insights and an innovative edge. However, to properly analyze the data collected or to train your ML models, you need ...
Gary Taylor

5 Reasons Why Virtual Desktop Infrastructure Will Go Mainstream Post 2020

Virtual Desktop Infrastructure Growth Virtual Desktop Infrastructure (VDI) technology enables remote users to access their desktop from anywhere using an internet connection. This technology has been around for a couple of decades but never received ...
Kayla Matthews

40% of Organizations Are Leaving Office 365 Data Vulnerable

Office 365 Data Vulnerable Microsoft Office 365 is a popular platform for individuals and organizations alike. But, recent research shows many organizations are apparently too dependent on Office 365 by using it as a backup ...
Big Data Explosion

Developing Machine Learning-based Approach for Optimizing Virtual Agent (VA) Training

Optimizing Virtual Agent (VA) Training Achieve NLU model’s precision, recall & accuracy up to 78% The success of any Virtual Agent (VA) depends on the training of its Natural Language Understanding (NLU) model prior to ...
Mark Barrenechea

Security is Job 1: Machines vs. Machines

Digital is redefining cybercrime and cyberwarfare Cyberattacks today are multi-stage, hard to discover and highly targeted. Some security threats are accidental, stemming from unauthorized employee access. As much as 38% of attacks come from internal ...