Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Yeshim Deniz, Liz McMillan, Pat Romanski

Related Topics: @CloudExpo, Open Source Cloud, Containers Expo Blog, @DXWorldExpo, SDN Journal, FinTech Journal

@CloudExpo: Article

Cloud Computing Takes Not-for-Profits to New Heights

There are little to no upfront costs with cloud services and consumption is usually billed on a monthly subscription basis

Not-for-profits and cloud computing seem to be made for one another.

The cloud IT delivery model is well suited to not-for-profits (NFPs) for a number of reasons, according to an article on CMO.com. There are little to no upfront costs with cloud services and consumption is usually billed on a monthly subscription basis, allowing for predictable budgeting.

There are also fewer IT staff requirements; this is ideal for NFPs who might not have the resources to hire skilled technical staff. In the specific case of server hardware, no servers need to be purchased, maintained, or recycled with a cloud service.

Other tangible benefits of the cloud for NFPs include rapid deployment of services, and the convenience of being able to use the service from any location - ideal for staff and volunteers.

Technology information resource for NFPs and libraries, Techsoup.org, makes a strong case for cloud computing adoption among NFPs. Anna Jaeger, co-director of TechSoup's GreenTech Initiative, concludes: "Small to medium-sized non-profits who have limited capital, limited space, and limited technical staff can benefit financially and environmentally from using cloud computing. It saves energy, reduces the amount of hardware needed, and is often technically easier to install and maintain than in-house applications."

Software Market Influenced by Nexus of Forces: Gartner
The cloud is a force to be reckoned with.

By 2017, new IT buying based on the Nexus of Forces will drive more than 26 percent of total enterprise software market revenue, up from 12 percent in 2012, representing more than $104 billion to new worldwide enterprise software revenue from cloud, information, mobile and social initiatives, according to a report from IT research firm Gartner.

The report, according to an article on eWEEK.com, said technology providers must realize that the disruptive forces of cloud, information, mobile and social will reach mainstream status in 2014 and create new technology requirements, drive new purchasing and establish new competitive realities. In the Nexus of Forces, information is the context for delivering enhanced social and mobile experiences, while the cloud enables delivery of information and functionality to users and systems. The intertwining of these systems creates what Gartner calls the "Nexus of Forces."

While the use of collaboration technologies, data analytics, mobile devices and software as a service (SaaS) have been in effect for more than a decade, their adoption and popularity have increased significantly over the last few years.

"While there has been a great deal of excitement from the vendor community regarding cloud, information, mobile, social, and other forces and technologies, adoption in organizations and businesses has yet to catch up with the hype," Tom Eid, research vice president at Gartner, said in a statement. "Adoption trends of new technologies frequently take many years before reaching maturity, stability and broad market usage. The nexus should be seen as a development and design philosophy rather than as a packaged product."

How to Reduce Risk and Protect Data in the Cloud
There's a ton of data floating around the enterprise, and exactly who has access to what is a growing concern for IT managers and CEOs alike. With employees, customers, business partners, suppliers and contractors increasingly accessing corporate applications and data with mobile devices from the cloud, protecting the edge of the network is no longer enough. As the traditional perimeter disappears, here are some safeguards to help ensure security in the cloud, according to an article on TheGuardian.com.

Know who's accessing what: People within your organization who are privileged users - such as database administrators and employees with access to highly valuable intellectual property - should receive a higher level of scrutiny, receive training on securely handling data, and stronger access control.

Limit data access based on user context: Change the level of access to data in the cloud depending on where the user is and what device they are using. For example, a doctor at the hospital during regular working hours may have full access to patient records. When she's using her mobile phone from the neighborhood coffee shop, she has to go through additional sign-on steps and has more limited access to the data.

Take a risk-based approach to securing assets used in the cloud: Identify databases with highly sensitive or valuable data and provide extra protection, encryption and monitoring around them.

More Stories By Patrick Burke

Patrick Burke is a writer and editor based in the greater New York area and occasionally blogs for Rackspace Hosting.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
Dynatrace is an application performance management software company with products for the information technology departments and digital business owners of medium and large businesses. Building the Future of Monitoring with Artificial Intelligence. Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like "How is my application doing" but no idea how to get a proper answer.
Having been in the web hosting industry since 2002, dhosting has gained a great deal of experience while working on a wide range of projects. This experience has enabled the company to develop our amazing new product, which they are now excited to present! Among dHosting's greatest achievements, they can include the development of their own hosting panel, the building of their fully redundant server system, and the creation of dhHosting's unique product, Dynamic Edge.
Your job is mostly boring. Many of the IT operations tasks you perform on a day-to-day basis are repetitive and dull. Utilizing automation can improve your work life, automating away the drudgery and embracing the passion for technology that got you started in the first place. In this presentation, I'll talk about what automation is, and how to approach implementing it in the context of IT Operations. Ned will discuss keys to success in the long term and include practical real-world examples. Get started on automating your way to a brighter future!
The challenges of aggregating data from consumer-oriented devices, such as wearable technologies and smart thermostats, are fairly well-understood. However, there are a new set of challenges for IoT devices that generate megabytes or gigabytes of data per second. Certainly, the infrastructure will have to change, as those volumes of data will likely overwhelm the available bandwidth for aggregating the data into a central repository. Ochandarena discusses a whole new way to think about your next-gen applications and how to address the challenges of building applications that harness all data types and sources.
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app security and encryption-related solutions. She holds a B.S. in Information and Computing Science from the University of Wisconsin at Green Bay, and an M.S. in Computer Science from Nova Southeastern University, and is an O'Reilly author.