Cloud

The Phenomenon of BYOD

October 24th, 2012

Bring Your Own Device (BYOD) phenomenon started when smartphones and tablets with more convenient form factor became ubiquitous among consumers. These devices with their touch-screen interfaces and powerful processors allow employees who brought them to work to be more productive on the go.  Assuming of course they could somehow get connected to the in-house WiFi.

Security Risks in the Cloud

September 30th, 2010

Security risks are concrete negative expressions businesses face when considering moving critical business systems to the cloud. Enterprises should make “demands” and ensure compliance of the cloud provider through the use of contracts or third party audits, but in reality the market will determine the amount of security provided to Enterprises by cloud service providers

Barriers to Cloud Adoption

September 23rd, 2010

Many businesses are reluctant to deploy cloud-based services for their core mission-critical applications.  Large and medium sized companies that have supporting IT organizations, have striven to increase vertical backward integration of core business processes.  Businesses believe that they inherently gain more certainty, control and competitive advantage by directly owning the data critical to their line

Cloud Computing key benefits

July 29th, 2010

Like any good consultant or analyst, you can summarize the key benefits in three easy statements: 1) cost, 2) computing on-demand or scalability, and 3) access to expertise on virtualization and technology.  The entire business model for cloud providers is to achieve economies of scale and provide processing power at a very low price.  It

Difference between computing in-house, normal IT outsourcing and cloud computing

July 28th, 2010

Cloud computing tends to be based on virtualization of servers and storage and software that supports many companies, simultaneously.  Cloud computing is the utilization of technology infrastructure to outsource a business process through what are shared virtualized infrastructures.  The maturity of the virtualized infrastructure may magnify the challenges for organizations in operating side-by-side with competitors

Personal Data – Cloud – Regulatory Compliance

Regulatory compliance plays a key role on whether to place sensitive personal data in a cloud service.  There are explicit implications concerning cross-border data and trying to understand and track where you data might end up in the cloud can be challenge all by itself.  The whole point of cloud computing is that you should

Cloud Computing Security Issues – nothing really new or different

Security compliance, addressed either by physical controls or logical controls, will still apply whether you operate on your premises or in a virtual environment.  Virtual environments just make this harder and when you rely upon a third party the phrase “trust but verify” is an apt response to ensure that this particular computing model does

Cloud Computing Comparison – value versus function

June 14th, 2010

Cloud Computing and its attendant services are not a fad that will fade anytime soon.  CIOs will be asked to examine how to use them and there will more direct pressure from CFOs and CEOs to bring down the cost of computing by using the cloud.  Trying to equate the cost of the in-house infrastructure

Benefits and Governance with Cloud Computing

June 8th, 2010

Cloud Computing, as defined by both National Institute of Standards and Technology (NIST) and the Cloud Security Alliance is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services).  These resources are configured / combined to operate like a utility. Cost is

IT is a Love Hate Relation

June 5th, 2010

Business grudgingly relies on IT to manage the books, usually to automate boring repeatable tasks fast and cheaply and sometimes to create a unique value to the business (when possible).  IT is rarely viewed as an equal partner in business and more as a utility player that makes things happen….slowly.  When the world of IT