Click here to close now.




Welcome!

@CloudExpo Authors: Elizabeth White, Liz McMillan, Roger Strukhoff, Pat Romanski, Harry Trott

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog

@CloudExpo: Article

A True Tipping Point for Cloud Adoption: 2012 Predictions

The cloud is a viable, scalable environment that yields cost advantages and improved reliability and security

Judging by the customer demand we've experienced at Virtustream, with many enterprises moving infrastructure and mission-critical applications into the cloud, it's safe to assume that we are nearing a true tipping point for cloud adoption. But with adoption comes demand for superior performance and improved reliability and security.

Changes to SLAs
Cloud service providers (CSPs) can expect clients and prospects to demand more detailed and comprehensive Service Level Agreements (SLAs). In many cases, enterprises leveraging cloud platforms from leading service providers have assumed that their SLAs covered more than they actually did. For instance, many existing SLAs have covered availability of compute, but not storage. A select few CSPs that have always had comprehensive SLAs in 2012 look for the industry as a whole to offer SLAs that cover the entire application stack.

Further, now that enterprises have experienced deploying a wide variety of applications in the cloud, they have learned that performance does not always meet expectations. This is largely a result of a cookie-cutter approach by many CSPs. Moving forward, application response times and performance are going to be key motivators for cloud migration and clients will expect these metrics to be covered by SLAs.

Better Security or Bust
The industry has been in the "honeymoon phase" for a while now in regards to security. While we haven't seen a seen a major cloud security breakdown yet, that doesn't mean that Cloud Security is mature and robust. The effort that hackers expend is often in direct proportion to the value of the systems and data. Today the majority of the infrastructure and applications that have been moved to the cloud represent less-critical applications. But that is about to change.

Because we're going to see mission-critical applications and content/information moving to the cloud, these platforms will become a more desirable target for hackers. Many CSPs begin with a secure design, but some don't. Regardless, rapid growth and adoption can lead to serious challenges around compliance and implementation. Even those with secure designs must have robust compliance monitoring, change control, and security event and information monitoring systems. Constant vigilance and attention to detail is required to ensure that implementation does not stray from secure designs, and that vulnerabilities are discovered and patched on a timely basis. Otherwise, cracks in the system will open doors for hackers.

In the inevitable event of a cloud security breach, we'll see the industry impacted in two significant ways. First - and most damaging - we could see companies that were considering cloud migration pull a full stop, taking a step back to reevaluate advantages vs. potential issues. Alternatively, a breach and the resulting security concerns could weed out some cloud service providers.

Expect companies to get tough with cloud service providers, asking more specific questions about security frameworks. The service providers that don't have all the answers will ultimately lose business.

Cloud Migrations and Impact on Software Vendors
Adoption of cloud computing to deliver cost efficiencies will lead enterprises to expect similar efficiencies from software vendors and the demand for "-as a Service" models will increase. This demand will bring about a few changes. First, vendors will need to rethink their licensing models and restrictions around multi-tenancy. Second, the role of the cloud service provider will evolve, especially if they deliver more services to end users. This expands the relationship between the cloud service provider and the end user while minimizing the independent software vendors' engagement with the end user. That said, as cloud service providers take on a larger role, the end users will expect software performance and security requirements to be built into SLAs. Full circle to end user expectations for more detailed SLAs.

While 2012 will likely not mean the end of the world, it could mean the end of the line for cloud service providers that are not tuned in to enterprise cloud computing needs. The cloud is no longer a test/dev sandbox. It has become a viable, scalable environment that yields cost advantages and improved reliability and security when built with complex enterprise IT demands in mind.

More Stories By Sean Jennings

Sean Jennings is Vice President, Solutions Architecture, at Virtustream. He has over 20 years of experience enabling commercial and government enterprises of all sizes gain efficiencies and competitive advantage through the design and deployment of creative, forward-looking IT solutions. He has been at the vanguard of the migration to commodity platforms throughout his career, designing solutions around and earning numerous certifications from industry leaders Novell, Microsoft, EMC, HP/Compaq/DEC, Checkpoint, and VMware long before they became fashionable.

Sean began his career as a programmer for Control Data, before transitioning into systems management and architecture on VAX and x86 platforms as a Senior Systems Engineer for Funds Associates Limited and PNC Bank. He was the Microsoft Systems Practice Manager for Virtualogic, now a part of EDS. He was also a Systems Architect and Vice President for National Cooperative Bank with responsibility for Disaster Recovery of x86 systems, Solaris, and AS/400. In 2001, Sean co-founded Brigh Technologies, Inc., with Matt Theurer.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@CloudExpo Stories
SaaS companies can greatly expand revenue potential by pushing beyond their own borders. The challenge is how to do this without degrading service quality. In his session at 18th Cloud Expo, Adam Rogers, Managing Director at Anexia, discussed how IaaS providers with a global presence and both virtual and dedicated infrastructure can help companies expand their service footprint with low “go-to-market” costs.
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
It's easy to assume that your app will run on a fast and reliable network. The reality for your app's users, though, is often a slow, unreliable network with spotty coverage. What happens when the network doesn't work, or when the device is in airplane mode? You get unhappy, frustrated users. An offline-first app is an app that works, without error, when there is no network connection. In his session at 18th Cloud Expo, Bradley Holt, a Developer Advocate with IBM Cloud Data Services, discussed...
University of Colorado Athletics has selected FORTRUST, Colorado’s only Tier III Gold certified data center, as their official data center and colocation services provider, FORTRUST announced today. A nationally recognized and prominent collegiate athletics program, CU provides a high quality and comprehensive student-athlete experience. The program sponsors 17 varsity teams and in their history, the Colorado Buffaloes have collected an impressive 28 national championships. Maintaining uptime...
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Edge Hosting has announced a partnership with and the availability of CloudFlare, a web application firewall, CDN and DDoS mitigation service. “This partnership enhances Edge Hosting’s world class, perimeter layer, application (layer 7) defensive mechanism,” said Mark Houpt, Edge Hosting CISO. “The goal was to enable a new layer of customer controlled defense and compliance through the application of DDoS filters and mitigations, the web application firewall (WAF) feature and the added benefit ...
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change t...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Digital Initiatives create new ways of conducting business, which drive the need for increasingly advanced security and regulatory compliance challenges with exponentially more damaging consequences. In the BMC and Forbes Insights Survey in 2016, 97% of executives said they expect a rise in data breach attempts in the next 12 months. Sixty percent said operations and security teams have only a general understanding of each other’s requirements, resulting in a “SecOps gap” leaving organizations u...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
You are moving to the Cloud. The question is not if, it’s when. Now that your competitors are in the cloud and lapping you, your “when” better hurry up and get here. But saying and doing are two different things. In his session at @DevOpsSummit at 18th Cloud Expo, Robert Reeves, CTO of Datical, explained how DevOps can be your onramp to the cloud. By adopting simple, platform independent DevOps strategies, you can accelerate your move to the cloud. Spoiler Alert: He also makes sure you don’t...
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, migrations, and degraded performance). Download Slide Deck: ▸ Here In his general session at 18th Cloud Expo, Scott Cleland, Senior Director of Product Marketing for the HGST Cloud Infrastructure Business Unit, discusse...
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...