The Challenge For Cloud Computing Consumers are driving cloud adoption far faster than enterprise IT can accept. Analytically speaking, consumers are driving this incredible rate of change for enterprise employers. The challenge one faces is that cloud computing is leading an enormous change in the enterprise IT environment, which can broadly be called the “consumerization” of IT, and this phenomenon has somehow to cater for the needs of consumers. The problem that follows this “consumerization” prodigy is that while consumers are wandering around with their personal clouds in their pockets, a whole lot of that cloud belongs to someone else;
The Public Cloud
How To Handle The Shock When You Receive Your Cloud Computing Bill It is common knowledge that there are hidden costs when your cloud-computing bill is delivered each month. There are, however, tried and tested practices you can adopt to avoid surprises. According to Dave Zabrowski,CEO and founder of CloudCruiser, it is really difficult for cloud computing providers to be completely transparent, especially for public clouds, but the hidden costs can be eradicated if only these providers would make an effort to be more transparent. Over-allocation is a basic problem being faced by cloud computing customers. When a company taps
Is My Public Cloud Too Public? Part 5 (Conclusion) Continued From Part 4 The ideal cloud equation Control + Visibility = Trust A cloud deployment that overcomes these myths is built on trust. Trust cannot be achieved without control and visibility across the cloud infrastructure, identities, and information. Control Availability: Ensure access to resources and recovery following disruption or failure. Integrity: Guarantee that only authorized personnel can access specific information and applications. Confidentiality/privacy: Protect how information and personal data is obtained and used Visibility Compliance: Comply with specific legal requirements, and industry standards and rules. Governance: Establish usage rights and enforce
“Private cloud is like a summer home, while the public cloud is a hotel.” – Part 2 This is the concluding part of a two part article. For the previous part, please see “Private cloud is like a summer home, while the public cloud is a hotel.” – Part 1. Security The owner of a summer home can hire private security to safeguard his property. However, if he doesn’t have the financial strength to do so, he risks incurring heavy losses. In a hotel, on the other hand, the management takes care of security. Similarly, the private cloud owner should
“Private cloud is like a summer home, while the public cloud is a hotel.” – Part 1 This is something I said during a recent Twitter chat on 12 April focusing on the interactions between the public and private clouds, and how converged clouds may be the solution to several associated problems (the conversations are viewable on Twitter under the #convcloud hashtag and the resultant article is: “Waiting for cloud standards is like Waiting for Godot” ). In this article, I will explain why I said what I said. Let’s compare a summer home and a hotel on different parameters.
Taking the bull by the horns—Secure Identity, Information, and Infrastructure Continued From Part 3 Public cloud computing requires a security model that reconciles scalability and multi-tenancy with the need for trust. As enterprises move their computing environments along with their identities, information and infrastructure to the cloud, they must be willing to give up some level of control. To do that, they must be able to trust cloud systems and providers, and verify cloud processes and events. Important building blocks of trust and verification relationships include access control, data security, compliance and event management—all security elements well understood by IT departments