It’s well documented that organizations are looking to the cloud for everything from infrastructure to security to social business software. Many companies are finding such success that they are migrating their infrastructure completely. Worldwide cloud computing will be worth $90.7 billion by 2018, according to Juniper Research, with software-as-a-service offerings topping the $53 billion mark in that same year. SaaS sales were $23.2 billion last year, according to the research firm.
Nearly all business leaders think collaboration is either crucial or very important, but more than half – 54% — say that the rapid convergence of collaboration and social tolls is also very confusing, according to a new study by non-profit research and education group AIIM, which serves the information management community.
Forbes contributor Joe McKendrick penned an interesting article this month about cloud contract negotiations, based on research findings published in the Stanford Technology Law Review. He poses the question: What’s negotiable and what’s not in a cloud computing arrangement? With cloud computing itself still evolving, negotiations among providers and enterprises are still evolving.
Security and the cloud can sometimes seem like a contradiction in terms, but all signs point to the inevitable — cloud will eventually dominate in the IT landscape, even becoming a source of all security and related services. But how soon until on-premise hardware is swept up into the sky? It may be as soon as 2015.
If the somewhat tepid predictions for technology investments has you feeling a bit gloomy about expansion in the coming year, it’s important to look at the numbers within the numbers to find the real bright spots in IT. To hear analysts tell it, even in these lackluster times, there’s few better opportunities out there right now than those afforded by the growing areas of analytics, Big Data, mobility, collaboration and cloud.
Pre-cloud computing information security typically focused on control via policies limiting access by IT managers and end users to reduce the likelihood of data loss, privacy breaches or noncompliance with regulations.