How Lean Is Your Cloud?

The Cloud Academy

Subscribe to The Cloud Academy: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get The Cloud Academy: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

Cloud Computing is the most discussed IT innovation of recent times. This Primer provides a structured overview of what Cloud Computing is and what the potential benefits and risks are. In addition it explores how Cloud Computing will impact IT management and IT's role in the organization as a service provider. It also looks at the risks of Cloud Computing. Risk is consistently cited by CIOs and CFOs as the largest obstacle of cloud computing for their organizations. In this primer we consider the risks in areas such as availability, privacy and regulatory compliance. The booklet explores some of the reasons why organizations want to implement Cloud Computing, to name just a few: cost-savings, increased speed and flexibility and higher performance. It looks at how the Cloud delivers against these expectations and debates its long term viability. The Cloud Computin... (more)

Vendor Lock-in and Cloud Computing

IT vendor lock-in is as old as the IT industry itself. Some may even argue that lock-in is unavoidable when using any IT solution, regardless of whether we use it “on premise” or “as a service”. To determine whether this is the case, we examine traditional lock-in and the to-be-expected impact of cloud computing. Vendor lock-in is seen as one of the potential drawbacks of cloud computing. One of Gartner’s research analysts recently published a scenario where lock-in and standards even surpass security as the biggest objection to cloud computing. Despite efforts like Open Systems... (more)

On Cloud Lock-in, Standards, Decoupling and Why SaaS Does Not Scale

With security and legal concerns being slowly addressed by the industry, lock-in and standards are rapidly becoming the biggest concerns regarding cloud computing. If the cloud industry is to make good on its promise, these will need to somehow be addressed. Let’s examine some recent developments. Interesting to see how, just a week after my blog on “The Principles and Perils of Vendor Lock-in” *1 several vendors made announcements seemingly supporting my suggested approach. For example, after hinting at the potential benefit of decoupling SaaS and PaaS from its underlying Infrast... (more)

VMworld 2010: Two Trends and How They Converge

You may have missed it in the flurry of news from Apple, but VMware recently had their annual get-together at the Moscone Center in San Francisco. On stage VMware shared two key insights: successful virtualization is becoming more about orchestration and automation than about hypervisors.  And, private clouds will rapidly develop into hybrid clouds. I agree on both but believe the combination of these two trends has some distinct consequences that did not get picked up by the media. Let me start with a disclaimer and some disclosure. I followed the event not on-site but through ... (more)

Counting Down To Cloud Expo Silicon Valley

Just back from Gitex (more about this later) and it is only one week to go to Cloud Expo Silicon Valley, which starts Monday November 1st. I will be speaking in track 4 “Real-World Cloud Computing & Virtualization” on Wednesday at 6:25 PM (the cloud is no 9-5 affair) about How Cloud and Virtualization Are Changing the Way Business and IT Will Interact. After speaking about this in Prague in June I was invited to give my perspectives also at the event in Santa Clara. Only 5 months have passed, but in cloud terms that is a life time. Come by and check out what has changed. If you c... (more)

Rogue Users and the Future of Corporate IT

Cloud computing can be seen as an important enabler for more user and business empowerment. Traditionally we consideredany IT outside the IT department’s purview“Rogue IT” or “Shadow IT”.  In this blog we examine how further user empowerment may impact the future of corporate IT. Rogue IT (sometimes called shadow IT or consumerism) is the phenomena in which employees outside the IT department deploy IT technology to achieve or automate certain tasks. Rogue IT is not a new phenomenon. But cloud computing is giving it a new runway and much better camouflage, since with cloud comput... (more)