The tipping point for Cloud Computing
Future of IT: Cloud computing is it now become an accepted form of provision of IT? And if so, how CIOs can they benefit?
In Chinese astrology, 2015 is the year of the goat, heralding 12 months of promise and prosperity. In technological terms, 2015 can be seen as the year of the cloud. After all, we finally reached a tipping point where the promise of on-demand computing is indeed held.
According to research firm IDC, cloud computing now accounts for a third of all spending on IT infrastructure . For applications, Forrester suggests that worldwide spending on software as a service (SaaS) this year will reach $ 106 billion, about 17% of total spending in enterprise applications.
Such high figures are a far cry from the early cloud computing during the last decade. At the time, the analysis firm Gartner predicted how IT point the application could transform enterprise computing, while industry experts began to develop the hype about buying software and infrastructure as a service (IaaS).
Today, cloud computing has become essential in the business. If the idea of migrating to an on-demand model could thwart the leaders was a time, a transition to the cloud is no longer considered a risk today. Effective governance can help establish which sectors can transfer what parts of their online activities.
The leaders have realized that it is more efficient and profitable assign non-core processes to third party providers. Why not a computer business she would manage an internal treatment center when external parties invested money in proven services and systems?
Faith in cloud computing is so great that many leaders would challenge a decision not to transpose these domains to a demand system. Now that the platform is considered mature, experts suggest that companies seek to further use the cloud. It may be, for example, to redefine the platform of legacy systems to support highly scalable apps or launch innovative services for customers, especially concerning mobility.
To sum up, 2015 could have represented a tipping point for cloud computing. However, with regard to the value these systems and services can offer the company, the prosperity that results from the use of on-demand computing is just beginning.
This type of architecture is very flexible. Thus, at any time the company may decide to re-internalize some of the infra home. And thanks to the interconnection between the different systems in place, a true hybrid cloud can be set up with service catalogs, dashboards and monitoring the quality of services seen by users.
Thus, it is possible to gradually emerge from the complexity that the company was a prisoner. The counterpart to negotiate is undoubtedly a high level of support and care needs, from design, consultancy, to operational maintenance.
And everyone has their place: the business directions retain their client position, and CIOs, that of project management, in partnership with his or her providers.
Cloud and IoT security
As often in the modern IT, the cloud could savior office.
Actors IaaS likely begin offering the administration of IoT devices. For example, Microsoft Azure IoT Hub already used to supervise the access of these connected devices and revoke “to maintain the integrity of your system.” As IoT collects a stream, these services will face hundreds of millions of devices.
Securing data in transit from the network of the summit will also be essential. Encryption should help guarantee confidentiality and data integrity, but organizations will also need to have the ability to detect when these connected objects are used as a means of attack against the heart of their network. Again, it is unlikely that this will be implemented otherwise than as a cloud service.
The IoT will require the ability to segment the network and consider that many of the terminals connected to it are vulnerable at best and at worst a security risk. According to Gartner, discovery, provisioning and authentication services represent a significant share of security spending dedicated to IoT.
But these services will not mature for years – it’s not the end of the decade they should reach the level of effectiveness required and able to operate at scale.
All puzzles security IoT will not be solved by one company. Some answers will come from the emergence of standards in specific industries – safety standards in home automation will be different standards around critical national infrastructure.
And terminals connected themselves will advance.
“If manufacturers do not act quickly, there will be some really horrible piracy” states Duncan Brown. “If you ask people to install antivirus on their televisions, it’s just the wrong solution to the problem. The industry will get there, but integrating safety from the beginning of the design will take time.”
“In five years we will be in a better position, but it will be a bumpy ride,” adds the analyst, IDC.