Category

Cloud Computing

Jun 022015
 
Five Myths About the Commoditization of IT

“Commodity” is a bad word among technologists. It implies standardized, unchanging, noninnovative, boring, and cheap. Commodities are misunderstood. This post seeks to dispel some of the myths around the commoditization of IT services (i.e., the cloud). 1. Infrastructure as a Service (IaaS) Is Not a Commodity Like Oil Yes, according to the technical definition of “commodity,” IaaS is not one. But then nor is oil, or gas, or coal, or pork bellies. None of these so-called commodities is perfectly fungible (i.e., so close to identical that a buyer is indifferent as to what is delivered), and being fungible is a prerequisite for any true commodity. When we refer to oil as a commodity, for instance, Read more

Dec 202014
 
IoT, the Reckless Adolescent

The Internet of Things was much in the news in 2014, and will continue to develop. In the last months of 2014, the emphasis seems to have shifted toward wearable devices for health and fitness improvement. These devices are particularly intrusive into our personal lives, yet the sensing and communication capabilities, as well as the analytics provided in the cloud for the data being gathered, are not being matched by an equal emphasis on information security and privacy. Will we see leaks and a backlash? Will the security part of the IoT architecture catch up, or will it just muddle along? Makers of devices and apps: take care of this before it hurts you. Buyers: Read more

Dec 162014
 
Secure Collaboration in the Cloud: the End of the Oxymoron

The adoption of cloud-based solutions for document sharing and collaboration has been increasing. The myth that there is absolute security inside the firewall and absolute chaos outside is crumbling. And in an age of mobile workforces and fuzzy enterprise boundaries, it makes little sense to continue to believe in the “walled fortress” model of security. This means that the market for content management systems is going to change dramatically. Many organizations will have a harder time justifying the license and support cost of a solution like SharePoint. Google, Dropbox and others are becoming more credible as enterprise solutions in the cloud. The established vendors need to offer cloud solutions, while their sales of on-premise suites Read more

Dec 092014
 
The SaaS Model May Begin to Lose Some Luster

The SaaS model may begin to lose some luster as enterprises begin feel the effects of IT playing a secondary role in implementations.  SaaS suppliers and integrators often try to push IT to the side as they sell their “new and improved” approach which speeds up projects and empowers business process owners and subject matter experts.  However, the dirty little secret is that the value of traditional IT disciplines transcends the hosting mechanism and the mantra of “configuration, not customization”.  The subjugation of IT can result in significant gaps in process and data analysis, planning for ongoing development and support, project management discipline, quality assurance, technical change management, environment management, and effective vendor relationship management, Read more

Dec 022014
 
The IaaS Battleground

The uncertain future of cloud computing and the plethora of frowny CIO faces of a couple years ago are rapidly giving way to the acceptance — if not embracing — of infrastructure as a service (IaaS), at least among IT leaders. The good news is that this shift is without the typical knee-jerk and shallow skepticism or naive Panglossian enthusiasm for the next new thing. This mental shift is tempered, real, and comes with more “buy” questions than “hold” or “sell” ones. In short, buyers and sellers are rolling up their sleeves and making plans. Google, Amazon, and Microsoft are in what looks to be an all-out race to zero as they take oxygen out Read more

Dec 202013
 
IT to Secure its Role in Selecting/Implementing Cloud Solutions

Here’s what I see coming in the new year: Enlightened CIOs will regain a key role in the acquisition and implementation of enterprise Cloud solutions, including Software-as-a-Service (SaaS) applications and Infrastructure-as-a-Service (IaaS) computing resources. They will not only put policies in place that will encourage end-users and business units to include IT in the procurement and deployment processes, but will also enable IT to play a more proactive role in the evaluation and selection process. Corporate end-users and business units will be forced to enlist greater IT involvement and support in the acquisition and implementation of enterprise Cloud solutions because they will face greater challenges integrating them into their existing systems, software and data sources, Read more

Dec 162013
 
Securing Internet Traffic

By the end of 2014 or the beginning of 2015, various large cloud providers as well as the Internet Engineering Task Force (IETF) will have developed mechanisms to protect most Internet traffic against the pervasive domestic spying performed by the U.S. National Security Agency. The NSA won’t be unable to decrypt the traffic it really cares a lot about, but it will just take too much computer time to decrypt all traffic, as it can do right now. I predict this because there is a great convergence happening. First, the NSA’s antics have finally made companies aware of the security issues involved in taking client-server traffic that used to be inside the firewall and moving Read more