Making the Cloud Safe for IT
If there ever was a “Buzzword Bingo” for technology (feel free to substitute Buzzword with another commonly played type of bingo that starts with “B”…), the center square that you get for free would have the word “cloud” deeply etched into the card. Even if it didn’t, it is very likely that “cloud” would be the first square called out at the beginning of the game anyways. The danger is that other seemingly simple words can quickly become part of this game, and as some people say: “It’s all a lot of fun until someone gets hurt”.
Over 80% of respondents to an F5 survey state they are currently at least in trial stages for a public or private cloud deployment. The survey indicates that cloud computing appears to have reached critical mass, but with a high level of confusion over what that actually means, it is difficult to say “Everybody is doing it” if we have trouble agreeing what “it” is.
As I wrote last time, developing an Enterprise/Web 2.0 product inside a security conscious company is interesting because you get to see “the other side of the coin”. So while we are developing cool new applications and addressing as many issues as possible, even the great mighty Google generates concerns for corporate IT. I just received an email from our IT department informing us about how Google Apps does not meet corporate IT policies, and usage of such a tool for internal purposes opens up quite a bit of risk in terms of confidentially, security, and traceability. Read the rest of this entry »
I really like being a Product Manager. Sure, it can sometimes be a (very) thankless job, but I like seeing what happens when the software development team for my product meets with the IT department of our own company (who are effectively representing my future customers). I got both teams in a design room last week to go over architecture for a product that I am working on. The results were sobering, but eye opening.