It’s been a busy year in cloud computing, but some articles stand out. Here are the most viewed cloud-related stories that were posted to the Cloud Computing Exchange and Information Management over the past year.
Why is integration so difficult in a cloud environment? Among the five key reasons: Data is widely distributed, everything happens faster, control becomes increasingly distributed, connectivity becomes more challenging than ever, and data volumes are increasing at an explosive rate.
Cloud computing based on pay-as-you-go infrastructure offers business intelligence users new data warehouse options that bring unlimited scalability without traditional data center overhead and budget constraints.
Cloud computing fundamentally moves infrastructures, IT support, data and services away from many organizations. It’s the catalyst for self-service BI adoption and information process transformation.
The cloud computing market will grow by nearly six times its current level, to $241 billion in 2020, according to research from Forrester. In the report, Forrester gathered market estimations from its business-to-business forecasting model for public, private and virtualized private clouds during the next decade.
Ventana research confirms that organizations are moving to the cloud now and will accelerate the pace of doing so in the near future. At least 20 percent of five different line-of-business functions use cloud-based applications, and within 12 months at least 40 percent of eight of nine functions will.
Dell is putting $1 billion toward the cloud over the next two years in the form of data centers, customer service outposts and new solutions. The company announced it would spend that amount over the next fiscal year building multiple eco-friendly data centers around the world for customer access to outsourcing capabilities and public and private cloud technology.
The Cloud Security Alliance, a not-for-profit industry organization, published a report identifying the top cloud security threats to help enterprises better understand and mitigate the risks associated with adopting cloud computing. The Alliance listed seven top threats which it said represent existing vulnerabilities: Abuse and Nefarious Use of Cloud Computing, Insecure Interfaces and APIs, Malicious Insiders, Shared Technology Issues, Data Loss or Leakage, Account or Service Hijacking, and Unknown Risk Profile.
ISACA, a nonprofit association of 95,000 members focused on information assurance and security, released a 190-page book with guidance to help organizations assess readiness and controls for leveraging elements of cloud computing. The guide outlines questions organizations should ask, governance and assurance considerations to be managed, and the risks and drivers to consider.
Steady growth in the cloud services sector reflects the rapid pace at which companies are moving all or portions of their computing, applications and data storage requirements to this emerging destination. According to Gartner, the industry is poised for strong growth through 2014, when worldwide cloud services revenue is projected to reach $148.8 billion. It’s clear, however, that cloud service providers understand the initial hesitation companies are experiencing in trusting crucial information assets to them, and they continue to work diligently to assuage concerns.
As the use of the Internet increases, more and more computing and storage resources are needed. These resources can be physically anywhere on Internet, which is the reason cloud computing is called virtualized. You don’t necessarily have to be able to touch the physical units. These virtualized resources can be added to the network to keep response time acceptable. This expandable network capability makes cloud computing dynamic. Since IT is often short on resources, cloud computing offers a practical solution by extending IT’s existing capabilities.
Register or login for access to this item and much more
All Information Management content is archived after seven days.
Community members receive:
- All recent and archived articles
- Conference offers and updates
- A full menu of enewsletter options
- Web seminars, white papers, ebooks
Already have an account? Log In
Don't have an account? Register for Free Unlimited Access