but I do have one question, how can I guarantee alternative or redundant routes to a sever? For example if I have a CRM service over a handheld app, what ahppens if my cloud provider goes down like over the weekend?
@Kim Davis I agree that it is wise to know all about the organization's IT application portfolio, the data these applications use and such to be able to protect them properly. Most don't really know what they're running, where it is running, what data is being produced, etc.
@django1 that all depends upon where the data is, how it is protected and how it is accessed. In some cases, a cloud provider has better security practices than do some of their cutomers. It's always wise to learn what YOUR supplier does before signing up.
@Kim Davis Who is responsible for security is something that needs to be fully understood before buying a service offering. Some suppliers will step forward and take responsiblity. Others will point to their contract language and say that it is the customer's problem.
Although Ts and Cs are boring and often writen in "legalese" they are very , very important. Who owns the data, who has access to the data, whether or not service levels are guarenteed, etc. are often spelled out there. If someone doesn't read them and is later disappointed with their experience, whose problem is that? The supplier? Google is a really good example of a supplier whose Ts & Cs should be required reading. Microsoft also.
@django1 Service providers are starting to offer datacenters in different places around the world and make it possible to choose where a specific server or workload will be housed. This also makes it possible for a customer to use different data centers so the failure of one won't put them out of business.
The folks having the knowledge of IT products, the expertise to put it to work, and the disastifaction with the staus quo could be considered the "wolves." The "sheep" are those who just use technology and don't care to understand it all that deeply. Companies, for example, could offer bonuses or promotions to those who find better ways of doing things and then publicize the winners broadly. This ony works if IT doesn't equate users with losers.
This is a thorny and difficult issue. The only way to prevent people bringing in their own equipment or signing up with their own service company is to create a very restrictive environment. Organizations have not been able to really lock things down completely. Successful companies have found ways to discover the "wolves" living out with the "Sheep" and then incent them to protect the sheep. I guess this means that IT and finanance will have to look for the teltale signes of cloud usage and only pay for things that they authorized.
@Mitch I know of a case from the late 1970s in which a set of Doctors used the services of a service provider. Later when they wanted to bring their computing in-house, the service provider claimed ownership of all of their data. It took an expensive court battle to straighten it out. In the end, the service provider was allowed to keep a copy of the Doctors' data.
This has been part of the emgence of nearly every technology I've followed. IT is charted to keep things running, keep things safe and end users often find that to restrictive. So, they go out, acquire the newest, most exciting technology, and bring it to the office. It is always challenging to maintain security, performance, reliability, etc. standards in that environment. In one generation is was departments buying their own minicomputers. In another, people would bring in their own PCs. Now we're looking at people bringing in their own smartphones, tablets, and using personal accounts at cloud service companies.
@mgriswold Data ownership and governance is one of the key challenges to cloud adoption. Many suppliers are working to offer tools and services to address those issues. I don't think a perfect solution has appeared yet.
@Daniel, Whats your take on the govt's assertion (related to the Megaupload/Kim Dotcom case) that data stored in the cloud is not yours and therefore not subject to the normal protections. If that proves to be true, would be a huge detriment to cloud computing
Microsoft wasn't the first and won't be the last to use this approach. As long as there have been attempts to create industry and international standards, there have been efforts to turn them to a single supplier's purposes.
Cloud computing, like other IT trends, is based upon trying to address customers issues. As long as the issues remain, the industry is going to try to address them. Cloud computing is a good example. It is based upon a long history of trying to reduce the cost and complexity of IT operations. It will be helpful to some and others would be best served by doing things themselves.
The national institute of standards has done a fine job of sketching out the basic cloud computing framework. Suppliers, of course, want to put their own spin on things and so, NIST's standards aren't the end of the road.
Here's my forst question for Dan: You talked during slide nine about the extent to which companies are using the cloud for extra capacity or nonstrategic applications. Do you see companies leaving their core applications in-house?
RE: fights over standards. Each supplier wants to create a stong competitive position. While each will say they're interested in standards, they are also trying to find a way to hold onto customers. This means each wants to bend the standards process to their own ends. This makes it hard to come to agreement on anything.
Platform, you can deploy your own software in the cloud, but don't manage networks, servers, operating systems, or storage. Infrastructure you do (obviously not for the whole cloud, but your part of it).
If you are having problems with audio, please refresh your browser. If that doesn't work, shut down and restart the browser. If that doesn't work, switch browsers. If that doesn't work, it's possible you're dialing in from a corporate network with a firewall that blocks this stream, in which case you'll have to log in and listen to the archive later.
As of last night the situation in Staten Island still seemed very dire. I haven't checked the news today. A friend is still trying to get in touch with a friend on the Jersey Shore and can't get through.
The ThinkerNet does not reflect the views of TechWeb. The ThinkerNet is an informal means of communication to members and visitors of the Internet Evolution site. Individual authors are chosen by Internet Evolution to blog. Neither Internet Evolution nor TechWeb assume responsibility for comments, claims, or opinions made by authors and ThinkerNet bloggers. They are no substitute for your own research and should not be relied upon for trading or any other purpose.
Recently, the Obama administration has been of two minds where privacy rights are concerned. On one hand, you have an administration that vowed to veto CISPA and mandated open data for government websites. On the other hand, you have an increasingly out-of-control Department of Justice on a fishing expedition at AP and demanding legislation to let the FBI wiretap private, encrypted communications and levy fines if a company fails to comply.
The apartment and house sharing service, Airbnb, now requires members to verify their identities by demonstrating a presence on the web, and by either scanning a government ID or entering detailed personal details. Other enterprises should take a close look at Airbnb's verification policies.
Facebook advertising is a lightning rod. It seems neither brands nor consumers are 100 percent happy about the social media site's policies, placement, or procedures. But the real controversy about Facebook ads and promotions is over whether they work.
The whole Amazon.reader debate is a double-stupid. It's stupid to think that there's any e-book buyer who doesn't know Amazon's URL, and it was stupider to let ICANN launch the whole free-form TLD initiative to start with.
Enterprises would like to move to cloud computing but are hesitant because they are concerned about providers’ ability to secure company data. Here are some tips that help to ensure that if breaches occur, the business is not left holding the bag.
Edmunds separates customers into segments based on the info it collects on its site and from partners, and uses that to push out custom content, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
The automotive website uses propensity modeling to target ads and customer registration forms, said Brian Baron, director of business analytics for Edmunds.com, at Predictive Analytics Innovation Summit.
Expert Integrated Systems: Changing the Experience & Economics of IT In this e-book, we take an in-depth look at these expert integrated systems -- what they are, how they work, and how they have the potential to help CIOs achieve dramatic savings while restoring IT's role as business innovator. READ THIS eBOOK
your weekly update of news, analysis, and
opinion from Internet Evolution - FREE! REGISTER HERE
Wanted! Site Moderators Internet Evolution is looking for a handful of readers to help moderate the message boards on our site as well as engaging in high-IQ conversation with the industry mavens on our thinkerNet blogosphere. The job comes with various perks, bags of kudos, and GIANT bragging rights. Interested?