We use cookies and other similar technologies (Cookies) to enhance your experience and to provide you with relevant content and ads. By using our website, you are agreeing to the use of Cookies. You can change your settings at any time. Cookie Policy.
Start a Discussion
Cloud Computing

What Improvements Would You Like to See With Cloud Computing?

Vote 0 Votes
What improvements would you like to see with Cloud Computing?

11 Replies

| Add a Reply
  • I guess 2 main areas: Portability and better ways to evaluate security in the Cloud.

    WRT to portability (of both applications and data) I think this is an important issue to mitigate any concerns over lock in and perhaps help deal with country-specific regulatory issues over the location of data.

    WRT to security, in my mind I think security is mostly a red-herring. Whether it's Cloud, hosted or On-premise, you have to deal with security issues. And one is not inherently more secure than another. It's just that you have to address security differently in each environment. I think that organizations like Cloud Audit and Cloud Security Alliance are helpful in this respect to let people compare the relative security of different platforms and frame how to approach the issue in the Cloud. Hopefully these groups will help move the discussion past (mostly useless) certifications like SAS70 which doesn't actually evaluate the quality of security, but that the provider adheres to their policies...which may be bad policies.

  • An appreciation by the business for the holistic requirements for computing. We cannot continue to break up IT function in horizontal silos without clear vertical ownership (note, not leadership, which many believe can be exerted by Enterprise Architecture, which almost never overcomes the political ramifications of silos). That is, we cannot continue to have one team own the network, another own the data center/server/storage, another own the SOC, another own the help desk & monitoring and expect that a single application will scale effortlessly and operate continuously. Siloed ownership of these critical components to Cloud Computing must fall under a single architectural owner that can ensure it all operates as a single unit.

  • Standards for basic infrastructure and key applications services.

  • I'd like it to live up to its moniker of *infrastructure* as a service and start providing access to more infrastructure services as, well, a service.

    Many of the issues revolving around security and performance can be addressed by infrastructure services; ones the enterprise is already familiar with and trusts and understands. Providing access to infrastructure services would allow cloud providers to differentiate on services instead of artificial coloring differences like APIs and management interfaces.


  • I agree with Glenn in that I, too, would like to see security improvements in cloud computing.

    Most security issues associated with cloud computing fall into two broad categories:

    (1.) Security issues faced by cloud providers (organizations providing Software-, Platform-, or Infrastructure-as-a-Service via the cloud)
    (2.) Security issues faced by their customers.

    In most cases, the provider must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information.

    In order to ensure that data is secure and that data privacy is maintained, cloud providers must attend to the following areas:

    (1.) Data Protection
    (2.) Identity Management
    (3.) Physical & Personal Security
    (4.) Availability
    (5.) Application Security
    (6.) Privacy

    Using an integrated real-time data surveillance and analysis solution, such as that from http://www.Vitria.com/

  • "Honesty"

    Truly, everything is not a cloud. We've seen this with SOA where everyone wanted a piece of the SOA action, so vendors started putting "XML interfaces" on their "objects" and renamed them "services". All of a sudden, SOA "did not perform" became a widespread belief. Let's not repeat that story with clouds. Virtualization is not Cloud Computing. Hosting a software application remotely such that "everyone can access it" is not Cloud Computing. Let's be honest for a change...

  • When talking about cloud options, we often see references to IaaS, PaaS, and SaaS.

    What the cloud really needs it "Activity as a Service" where business processes are a fundamental part of the cloud infrastructure, offering a human-oriented way of linking cloud applications together.

    Think of it as a "object linking and embedding" for cloud business processes.


  • I agree with Adrian, standards around cloud are key, I've been seeing a lot more conversations pop up around this subject.

    In terms of Shalin's point on security, IBM recently announced new offerings to help customers secure their cloud environments. The Managed Security Services - hosted vulnerability management offering can help clients identify vulnerabilities across the network, devices, servers, web applications and databases to manage risk.

    The hosted security event and log management is another cloud-based service designed to help customers lower the costs and realize a quicker time-to-value with security incident and event management.

    Below is a link to the press release, would be curious to know what you think.

  • They said it.

    Cloud standards that can actually make it past the 6 month hype and a set by which vendors truly believe can work in practice and not just theory.

  • If anything, it'd be to stop marketing cloud as its own solution, and instead talk about the solutions that are best enabled by cloud. We achieved great things with SOA while at the same time it became a bad word, mostly due to overhype and marketing. SOA by itself did nothing, but lots of companies went ahead and did great things enabled by SOA.

  • user-pic

    In order to ensure that data is secure and that data privacy is maintained, cloud providers must attend to the following areas:

    (1.) Data Protection
    (2.) Identity Management
    (3.) Physical & Personal Security
    (4.) Availability
    (5.) Application Security
    (6.) Privacy
    (7.) Security

Add a Reply

Recently Commented On

Monthly Archives