2011: The year of the cloud

CA
17 Jan 2011
00:00

Clouds will reign

It is not just an incremental advance in IT; cloud computing represents a paradigm shift in the IT industry and for how technology will transform business. In 2010, there was a lot of talk about cloud computing. In 2011, the talk will become a reality, and cloud computing will become the predominate way that organizations operate – either via public, private or hybrid clouds.

Organizations will uncover realistic, practical uses that give them the flexibility and speed they require to better meet the fast-changing needs of the business. Service providers will prove to be the guidepost for enterprises, as IT pros look to them for lessons learned.

Additionally, the role that technology plays within the enterprise will shift as cloud computing takes hold. IT will now become a major business driver and become vital to how the business functions – from operations and sales to branding. The new role of the CIO will be to strategically manage an IT supply chain pulling in resources as needed -- everything from complete applications to massive amounts of cloud-based processing capacity and data storage.

Increasingly, the IT department’s role will be less about hands-on technology management and more about bringing together business and IT governance. At the same time, you can expect non-technical executives and managers to become more deeply involved in technology.

Consumerization of IT … “To the Cloud”

The groundswell of consumer technology is taking over the enterprise. Businesses now want speed, choice, secure, and agile technology at their fingertips. The cloud, virtualization and mobile devices are making this possible. The IT professional will need to move quickly in order to provide the necessary infrastructure and services that its users increasingly demand.

Organizations will change their perception of cloud security as stronger, more advanced security options are deployed as cloud services from organizations that specialize in security. This specialization provides a level of security that most organizations cannot reach on their own.

In doing so, it increases security confidence and makes security an enabler of cloud adoption. For example, Identity and Access Management capabilities such as advanced authentication and fraud prevention, single sign-on, identity governance and others are offered as a cloud service. They are more easily adopted, deployed and managed by both growing enterprises and very large enterprises, and they give users the confidence that they can control who has access to what.

Related content

Follow Telecom Asia Sport!
Comments
No Comments Yet! Be the first to share what you think!
This website uses cookies
This provides customers with a personalized experience and increases the efficiency of visiting the site, allowing us to provide the most efficient service. By using the website and accepting the terms of the policy, you consent to the use of cookies in accordance with the terms of this policy.