Skip to main content

Cloud Computing reality check

John spoke to some folks and despite concerns there see to be growing interest in Cloud Computing. Obviously it is very clear that we were focusing on the wrong layer a bit too long (Virtualization, I mean) and its rapid commoditization with the increasingly (aspirational) consumerization of IT.

Following is a recap of some of what was discussed during those two sessions:

• One big question people had was how to go about integrating cloud-based applications and data with on-premises applications and data. This will be an issue for virtually any company moving into the cloud. As just one example of how that might be done, SnapLogic offers integration packs designed to work with some software as a service applications. InformationWeek will take a deeper dive into this subject in the next few weeks.

• A related issue is data quality. As companies move e-mail and other applications into the cloud, the integration points (Active Directory, for example) will become weak links and IT problems if your data isn't clean.

• There are a range of IT governance issues, not the least of which is e-discovery. Some questions that came up: How do you run e-discovery against hosted e-mail? And what privacy protections are in place so that your company's legal experts can access what's needed, but not the cloud service provider? Another way of looking at this is the "chain of custody" of your corporate data in the cloud.

• The point was made that many IT departments overlook or underestimate the network bandwidth requirements for cloud computing. One CIO said he increased network capacity by a factor of five when he moved some of his company's IT workload intoAmazon (NSDQ: AMZN)'s Elastic Compute Cloud. That's not a rule of thumb for everyone, but it's a good example of what one company had to do.

• There were a lot of questions, and not many answers, on service level agreements. It became clear that IT pros need to do their homework on SLAs as they shop among cloud service options.



  1. Good post. I think most IT departments are woefully behind being ready for the cloud because they haven't fully implemented information security policies and standards. The danger of the cloud is separating the application from the data, and making sure that there are clear perimeters around each. Without implementing all the information security measures, vendors can take a position of plausible deniability.


Post a Comment

Popular posts from this blog

DeepLearningTrucker Part 1

Avastu Blog is migrating to; 1st Jan 2009 live


I will send out emails personally to those who are using my link(s) on their sites.

Thanks much for your co-operation and hope you enjoy the new site and its cool new features :-)

Not like the site is unlive or something..on the contrary, its beginning to get a lot of attention already. Well most of the work is done, you don't have to worry about anything though:

What won't change

Links/Referrals: I will be redirecting the links (all links which you may have cross-posted) to - so you don't have to do anything in all your posts and links. Although, I would urge however that you do change the permalinks, especially on your blogs etc yourselfThis blog is not going away anywhere but within a few months, I will consider discontinuing its usage. I won't obviously do …

Cloud Security: Eliminate humans from the "Information Supply Chain on the Web"

My upcoming article, part - 3 data center predictions for 2009, has a slideshot talking about the transition from the current age to the cloud computing age to eventually the ideation age- the age where you will have clouds that will emote but they will have no internal employees.

Biggest management disasters occur because internal folks are making a mess of the playground.

Om's blog is carrying an article about Cloud security and it is rather direct but also makes a lot of sense:

I don’t believe that clouds themselves will cause the security breaches and data theft they anticipate; in many ways, clouds will result in better security. Here’s why: Fewer humans –Most computer breaches are the result of human error; only 20-40 percent stem from technical malfunctions. Cloud operators that want to be profitable take humans out of the loop whenever possible.Better tools – Clouds can afford high-end data protection and security monitoring tools, as well as the experts to run them. I trust…