Dispelling 5 common myths of cloud computing

    

As vendors race for mindshare, the haze and the hype around cloud computing has moved faster than the reality.  As a result, there more definitions, and more myths, around cloud than nearly any IT concept I can remember in the 20-some years that I have been writing about technology.  One need only look at the cloud computing article and the corresponding talk page on Wikipedia to see the various points of view, definitions and misconceptions out there regarding the evolutionary transformation that has become known as cloud computing. 

 

So let’s look at five of the most common mistaken beliefs and shed some light on them. 

 

Myth One:  The public cloud is the most inexpensive way to procure IT services

Fact:  Not always.  The best approach is to have a comprehensive IT delivery strategy that takes into consideration your specific requirements and then builds a cloud road map.  The roadmap might include private and public cloud delivery as well as traditional IT delivery.  You need to fully investigate the possibilities, risks and business implications of all delivery models against the unique requirements of your business.  In fact, IT analysts agree that most large organizations will deploy a hybrid approach, depending on the IT service that is to be delivered.

 

Myth Two:  Baby steps in virtualization are the only way to reach the cloud

Fact:  Virtualization is not the only way.  While virtualization can be helpful to begin your cloud journey, they are many roads to cloud.  In fact, you can have a cloud implementation up and running in as little as 30 days and leap frog the virtualization process, if you use the right combination of technology and services.  With SaaS you can be up even faster.

IOEdrawing.jpg

 

Myth Three:  Critical applications do not belong in the cloud

Fact:  Not true.  Business critical apps can be deployed in the cloud if you have the means to create a service catalog and a way to automate business critical applications such as ones from SAP, Microsoft and Oracle. What you need is a map that can save you days or weeks of time while helping to ensure accurate deployment, configuration, and sizing of cloud services for specific applications and services. You need a vendor who can create a Cloud Map for your specific information including workflows and scripts designed to automate installation more quickly and in a repeatable fashion.  You need a Cloud Map that lets you set up critical business applications to use both the physical and virtual aspects of a cloud infrastructure.

 

Myth Four:  Public cloud security and management concerns apply to all clouds

Fact:  You must secure your IT delivery differently depending on how the IT service is provided. Some mistakenly believe that private clouds are more secure because the data stays within the control of the IT department.   The private cloud has security vulnerabilities too, including those that exist with connection to the Internet. There is also the threat of insider attacks and data theft. Regardless of whether you have a public, private or hybrid delivery model, you need built-in security that only experts can deliver. 

 

Myth Five:  There is only one way to do cloud computing

Fact:  As stated above, there are a number of cloud delivery models available.  And most organizations will deploy IT services via a hybrid model consisting of private and public clouds and traditional IT.  To seize the true agility and cost benefits of cloud computing, you need support for the broadest set of applications, flexibility to scale capacity inside and outside the data center, and a cloud system that supports heterogeneous environments.  Be sure to work with a vendor you trust with solutions that do not require vendor lock-in.

 

For a more in-depth discussion of these topics and for more help in separating the hype from the facts, I invite you to download this new business white paper Five myths of cloud computing.

 

Related links:

Labels: cloud computing
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author
Judy Redman has been writing about all areas of technology for more than 20 years.
Featured


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.