LinkedIn Twitter
Director, OpenShift Strategy at Red Hat. Founder of Rishidot Research, a research community focused on services world. His focus is on Platform Services, Infrastructure and the role of Open Source in the services era. Krish has been writing @ CloudAve from its inception and had also been part of GigaOm Pro Analyst Group. The opinions expressed here are his own and are neither representative of his employer, Red Hat, nor CloudAve, nor its sponsors.

4 responses to “Enterprise Cloud Computing And Wikileaks Saga”

  1. JoeTierney

    Great post Krish. I certainly agree cloud providers need to do as much as possible to meet exceptional standards for security and compliance. Ultimately however it is the role of the enterprise executive to perform the due diligence in vetting cloud providers as well as understanding the fundamental economic advantages of consuming specialized technology services. Google, Amazon, Workday, and other modern cloud providers could spend all of their time working to satisfy the concerns of every enterprise executive but eventually the issues at debate are exhausted. The best use of their limited resources is to enable those who are willing to listen and learn about the services available to them and to continue adding customers.

    The duty of the executive is to the mission of the firm. If the firm does not specialize in technology services then it should not be delivering technology services. Enterprises are running IT shops of which they’re the only one’s buying – it’s a horribly expensive model but was historically the only option.

    Your Wikileaks example clearly illustrates the critical nature of security but it speaks as much, if not more, to issues with the status quo. PFC Manning had a laptop with an optical drive, files on local servers and file shares. The Army was unable to manage security trimming properly because of the complexities of sharing data globally via technology originally designed to be used locally and with individual productivity in mind rather than collaborative work. In this instance there could have been many advantages of data centralization and access only via web thin client devices. By design the legacy tools simply aren’t up to the task.

    Executives can continue to invest in the status quo of owning and running software products or they can do their homework and begin the transition to consuming technology services. We buy 3rd party products to generate services and that’s more secure than buying 3rd party services? It’s an opinion that will persist for decades but that doesn’t mean the rest of us have to sit around and wait to move forward.