In a recently published Strategic Perspective, Saugatuck articulates how a Hosted Private Cloud may be the best alternative for workloads involving sensitive data requiring a degree of security. In addition we offer seven additional key factors to consider when evaluating Cloud offerings for specific workloads:
- Optimal Capacity
- Flexible Capacity
- Server Provisioning
- Availability and Disaster Recovery
- Application considerations
- Metered Usage and Chargeback
“Cloud Robotics” as a term is only a few years old, but the idea has been around for some time. If complex sensory tasks can be performed at a distance, then robots will need to have less bulky processing units on board. With expanding connectivity and higher bandwidths, some of the latency issues in this type of arrangement are being removed, and many vendors are looking at this area with renewed interest.
Robotics are essential to modern industry, and will play an ever-increasing role in daily life. Many, such as vehicles, will require some degree of autonomy. They will also require an ever increasing amount of processing and storage. The Cloud makes it possible to virtualize robot components and provide sensory and other solutions that can take advantage of the enormous facilities of Cloud IT. Robotic components can be virtualized and provided for interaction and download as a Robot-as-a-Service parts. Using the Cloud, moreover, provides access to all of the data and programming available on the Internet, and the ability to directly share learning between robots. It also makes it possible to coordinate robot teams for work on complex processes. Continue reading
In a Strategic Perspective recently published for our subscription research clients, Saugatuck explains why – despite seemingly successful Private Cloud implementations – IT organizations are finding their users are not fully satisfied. Saugatuck terms this as a Fulfillment Gap.
Such a gap typically results from inadequate focus on the tools and processes required to manage the Private Cloud. Saugatuck recommends patterning the services and management of Private Clouds after Public Cloud IaaS offerings. This entails incorporating capabilities that support and manage Private Clouds such as: Continue reading
The latest Saugatuck research survey is complete, with the first, topline data results and insights published for our research clients just this week. We’ve also published the first in a series of deeper dives – Strategic Perspectives examining specific survey data sets, developing client-focused insights, and providing summary guidance.
The first Strategic Perspective on this was published simultaneously with the survey report. In it, we look at a series of 10 statements along with the percentages of participants who agreed or disagreed with each. This approach provides simple, fast, and accurate insights into participant thinking and beliefs, helping us to develop and refine real-world trends, constructs and scenarios more quickly and more accurately.
The survey question being considered in this first Strategic Perspective is simple: “Please indicate your level of agreement with the following statements on emerging technology.” Continue reading
As we roll into Friday the 13th, we see that Cloud security is a hot topic again this week. A review of news feeds, blog posts, Twitter feeds and more reveals a plethora of publications and posts generating FUD regarding Cloud security.
The net feeling across all of these is that Cloud is big and scary. The negative quotes cited all seem to be from IT “security experts” and providers of IT security. Hmmm.
The most-cited security breaches include the December 2013 Target breach (not Cloud; failure to develop and manage adequate security within Target), various laptop and memory stick thefts beginning in the 1990s (obviously not Cloud; failures of security management and practice), and the October 2013 MongoHQ breach, which suffered an attack through social media app provider Buffer. Continue reading
The US Federal Communications Commission (FCC) voted 3-2 on May 15, 2014 to proceed with discussions to modify existing Net Neutrality policies, as documented in its Notice of Proposed Rulemaking (NPRM). The FCC is “seeking public comment on how best to protect and promote an open Internet.” Some harsh critics suggest the FCC proposals will end Net Neutrality and slow Cloud adoption. Some consumer advocates suggest these proposed rules unfairly favor ISPs and would mean higher prices and inconsistent service performance. Others argue the ISPs ought to be able to expand their infrastructures and run them however they want to recoup their extensive investments.
There is much confusion about Net Neutrality and the recent FCC actions. FCC Chairman Wheeler wants rules that will prevent improper blocking of and discrimination among Internet traffic, while ensuring genuine transparency in how Internet Service Providers (ISPs) manage traffic. Yet two of the five FCC commissioners question whether the broadband Internet even falls under the FCC’s authority. The FCC’s chairman asserts it is his intention to have enforceable rules by the end of 2014.
The affects of the potential future changes to Net Neutrality on the Cloud business have yet to be fully explored. Much about the Cloud infrastructure and practices has Continue reading
What is Happening?
Verizon’s annual data breach investigations report is out, and Saugatuck’s analysis of the information, gathered from 50 sources cataloguing 63,000 security incidents across 95 countries is this: Despite investing billions in hardware, software, and services, we have learned little to nothing about managing data and system security effectively.
Two things stand out in our review of the report:
- The number and scope of data breaches bears little resemblance to the related hype and resultant market perceptions; and,
- The vast majority of data breaches (and losses) are still, quite simply, preventable by improving and adhering to consistent management practices. Acquiring and implementing security technology does not effectively prevent data loss.
First, let’s look at perceptions and realities regarding frequency of system breaches and resulting losses of data. The pie slices in Figure 1 use Verizon’s published data to illustrate the relative numbers of reported data breach incidents by firms in 21 industry categories, alongside the relative percentages of actual losses reported by the same firms.
Figure 1: Analyzing Verizon’s Data Breach Data
Source: Saugatuck Technology Inc. from Verizon Inc. data published April 2014 Continue reading
In recent weeks Amazon, Google, and Microsoft have all announced another round of reductions in pricing for various facets of their Cloud offerings. Some pundits and media have highlighted the collective announcements as a “price war”. In a recently published Strategic Perspective available to our premium subscription research clients, we look at the underlying implications of price reductions, and we offer projections of how the Cloud market is beginning to change. Continue reading
The accelerating pace of technological and business change wrought by Cloud development and advancement too often leads IT providers into situations where they lose sight of their goals, or lose their ability to concentrate on those goals and effectively manage according to an operative strategy.
Discussions about this with current and former military leaders working with IT providers led more than one of them to note the consistent similarities between the “fog” of uncertainties, change, and positioning within Cloud-speed IT markets, and the so-called “fog of war” – the confusion that tends to reign among commanders and combatants, either prior to action, during action, or after action – and often, in all three circumstances combined.
In 2003, former US Secretary of Defense and World Bank CEO Robert S. McNamara was the subject of an Academy award-winning American documentary film entitled “The Fog of War: Eleven Lessons from the Life of Robert S. McNamara.” In the film, director Errol Morris interviews McNamara about eleven “lessons” contained in McNamara’s 1995 book, In Retrospect: The Tragedy and Lessons of Vietnam. The conditions, thinking, and actions described in those lessons are particularly well-suited to complex and rapidly-changing business environments, such as those enabled, driven, and shaped by Cloud IT. Continue reading
Adoption of Cloud offerings is expanding rapidly. Based on on-going discussions with Cloud users, Saugatuck has identified that the focus of IT organizations is evolving while they are learning “rules-of-thumb” about ongoing operations of Cloud-based workloads. Together there is a likely evolution of customer requirements related to Cloud. Saugatuck recently published a Strategic Perspective which projects a shift in the focus of IT organizations when adopting and using Cloud-based offerings through three overlapping phases:
- Phase 1: Conventional – Infrastructure deployment.
- Phase 2: Growing – Infrastructure optimization.
- Phase 3: Emerging – Support and Delivery Services. Continue reading