Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Liz McMillan, Pat Romanski, Elizabeth White, Yeshim Deniz

Related Topics: @CloudExpo, Agile Computing, @DXWorldExpo

@CloudExpo: Article

Don't Throw the Baby Out with the Bathwater | @CloudExpo #Cloud

Three features missing from the cloud

It's a well-known adage, ‘Don't throw the baby out with the bath water'. These days we generally don't toss our bathwater out the window, nor do we make a baby take the last bath - but we should probably still heed this advice. Especially when we consider adopting and transitioning to new technologies.

Benefits of Moving to the Cloud
For companies moving their services or their infrastructure to the Cloud there are some obvious benefits: often the costs are lower, data can be accessed from desperate locations, and less maintenance is required.

Features ‘Thrown Out' in the Move to the Cloud
For the Cloud, like most innovations, there are some features that were missed in its development. In most cases the features were not missed intentionally, but they were missed none the less. So as businesses and individuals, we need to be aware of the absentee features as we transition to the Cloud and work to ensure that eventually the missing features are made available.

Missing Feature 1: Unpredictable Costs
Generally speaking, hosting data on the Cloud is less expensive than maintaining that same data locally. However, because Cloud costs are accrued by use, and not at a flat rate, spikes in usage equate to spikes in costs. While not usually an issue for the individuals or group managing the Cloud infrastructure, this can be a challenge for financial managers and those responsible for making and meeting budgets.

cloud-migration-mistakes

Missing Feature 2: Performance is Not Equal
Because architectures in the Cloud were not developed in the same way as architectures in local servers, moving from one to the other often involves unseen complications. These differences, when not mitigated, can cause a system to not perform as expected.

Missing Feature 3: Security Is Not Human Proof
There is security built into the Cloud which better protects data against unauthorized access than the security of most local storage. However, this added security does not protect against human errors. And because Cloud systems are built for ease-of-use, there is more access to features, which can result in more accidents. When there is less friction involved in performing an action in the Cloud (creating a machine or standing up a server) it becomes much easier perform the wrong action (deleting a production server). Ease-of-use and access are powerful tools when an action is positive but can be highly detrimental when the action is negative.

What does this mean?
The problem is not just that there are pieces of functionality missing from the Cloud, but that the people expect that the missing functionality to have moved to the Cloud with their data. In the short-term, we all need to be more contentious of the features that exist in the Cloud and those that don't - and tread lightly when taking ‘permanent' action.

More Stories By John Basso

John Basso is an experienced technology executive with a unique ability to help businesses win through strategic roles both inside and across multiple organizations. He has been leading technical teams and implementing leading-edge business processes and custom technology solutions for over 20 years.

John’s versatile skill-set across all major business functions has made him an integral part of the success for Amadeus Consulting - where he is the CIO. As a dynamic executive, John is inserted into critical phases of the business lifecycle for Amadeus Consulting and works closely with its business partners to ensure their success.

John's demonstrated ability to manage complex custom software development programs across US and international teams has led to senior executive positions, including Chief Strategy Officer, CTO, and VP of Marketing, with several Amadeus Consulting clients and partners. Additionally, he has extensive experience with venture capital funding and was a key contributor to equity investment deals for three different promising startup companies of over $20 million each. Boards: Left Hand Design Corporation, Business Information & Analytics Advisory Board, University of Denver’s Daniels College of Business

Awards: "Forty Under 40 Business Leader" by the Denver Business Journal in 2005, Eco Hero by the Boulder County Business Report.

CloudEXPO Stories
When applications are hosted on servers, they produce immense quantities of logging data. Quality engineers should verify that apps are producing log data that is existent, correct, consumable, and complete. Otherwise, apps in production are not easily monitored, have issues that are difficult to detect, and cannot be corrected quickly. Tom Chavez presents the four steps that quality engineers should include in every test plan for apps that produce log output or other machine data. Learn the steps so your team's apps not only function but also can be monitored and understood from their machine data when running in production.
With the mainstreaming of IoT, connected devices, and sensors, data is being generated at a phenomenal rate, particularly at the edge of the network. IDC's FutureScape for IoT report found that by 2019, 40% of IoT data will be stored, processed, analyzed and acted upon at the edge of the network where it is created. Why at the edge? Turns out that sensor data, in most cases, is perishable. Its value is realized within a narrow window after its creation. Further, analytics at the edge provides other benefits.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by FTC, CUI/DFARS, EU-GDPR and the underlying National Cybersecurity Framework suggest the need for a ground-up re-thinking of security strategies and compliance actions. This session offers actionable advice based on case studies to demonstrate the impact of security and privacy attributes for the cloud-backed IoT and AI ecosystem.
Enterprises that want to take advantage of the Digital Economy are faced with the challenge of addressing the demands of multi speed IT and omni channel enablement. They are often burdened with applications that are complex, brittle monoliths. This is usually coupled with the need to remediate an existing services layer that is not well constructed with inadequate governance and management. These enterprises need to face tremendous disruption as they get re-defined and re-invented to meet the demands of the Digital Economy. The use of a microservices approach exposed through APIs can be the solution these enterprises need to enable them to meet the increased business demands to quickly add new functionality.
Steadfast specializes in flexible cloud environments, infrastructure hosting, and a full suite of reliable managed services and security. Complemented by expert consultation at all stages of design and deployment to maintenance and expansion planning, Steadfast delivers high-quality, cost-effective IT infrastructure solutions, personalized to customer needs.