Skip to main content

House on the Cloud?

I work in IT.  I know a a few things about computers.  So when someone mentions the word 'cloud' I generally know what they're talking about.  And generally glaze over when they start talking about 'the future', or 'amazon', or they're working on a 'cloud infrastructure'.  So what?  Big deal.  Will it improve the business or end user experience?

In the short term probably not.  Most organizations will have a cloud project of some sort.  Even if that project is to simply find out what the cloud project should be.  That's fair enough.
The technology, process, security and personnel of cloud are *relatively* new in comparison to stuff like server-client computing or thin-client infrastructures.  However the more subtle uses of cloud like services have started to appear in my home.  And that I am all for.

Take television for example.  I last year I upgraded my satellite kit to include a disk based recording system.  So now I can record and watch TV at the time I want to watch it.  Nothing majorly new there.  However, the service also allows me to watch series and movies 'anytime' I like with the media either streamed or downloaded locally to my disk based recording system.  I now no longer need to buy a DVD box set.  I don't even need to 'own' anything, I just pay for the service and enjoyment of watching The Sopranos season 1 from the beginning, as delivered through the satellite and broadband infrastructure of my TV provider.

Are you in the clouds?


I also recently upgraded my mobile - yes I know it seems like I lived in the dark ages, but I was waiting for you guys to rid me of the bugs with your first mover advantage - to a more capable smart phone.
I instantly downloaded the Kindle for Android app - a combination I may add that couldn't be more perfect if they tried.  Within minutes I had access to copyright free (and thus cost free...) classics such as The Origin of The Species, The Wealth of Nations, The Communist Manifesto and The Life of Buddha.  All 4 will no doubt be great reads, but I would never have bought the hard copies mainly due to cost, space and the time it takes to read (everyone knows reading on a Kindle book via a smart phone takes only 1/100th of the time to read a 'real' book.  The 99th saving coming mainly from coolness....).  So now, my phone or the service I'm actually subscribed to, contains all my reading material, bookmarked, organized and ready for use 24 x 7 without me having to actually physically own anything.

The same principles can also be applied to music which was probably first on this band wagon from an entertainment perspective, with the likes of last.fm allowing you to create your online radio station.  The end result is you listen to music, without owning the disk or MP3.

This increased 'as-a-service' approach, will soon start to cover other elements of our non-work life as long as the end product isn't altered or degraded.  Most people want good service at a better price and this virtual out sourcing approach certainly fits the bill for the time being.  Our homes could become objectless states of service delivery and all we have to do is cough up the cash for the pleasure.

So in a changing world, spending cash will be one thing that stays the same.

Popular posts from this blog

The Role of Identity Management in the GDPR

Unless you have been living in a darkened room for a long time, you will know the countdown for the EU's General Data Protection Regulation is dramatically coming to a head.  May 2018 is when the regulation really takes hold, and organisations are fast in the act on putting plans, processes and personnel in place, in order to comply.

Whilst many organisations are looking at employing a Data Privacy Officer (DPO), reading through all the legalese and developing data analytics and tagging processes, many need to embrace and understand the requirements with how their consumer identity and access management platform can and should be used in this new regulatory setting.

My intention in this blog, isn't to list every single article and what they mean - there are plenty of other sites that can help with that.  I want to really highlight, some of the more identity related components of the GDPR and what needs to be done.

Personal Data On the the personal data front, more and more org…

Top 5 Security Predictions for 2016

It's that time of year again, when the retrospective and predictive blogs come out of the closet, just before the Christmas festivities begin.  This time last year, the 2015 predictions were an interesting selection of both consumer and enterprise challenges, with a focus on:


Customer Identity ManagementThe start of IoT security awarenessReduced Passwords on MobileConsumer PrivacyCloud Single Sign On
In retrospect, a pretty accurate and ongoing list.  Consumer related identity (cIAM) is hot on most organisation's lips, and whilst the password hasn't died (and probably never will) there are more people using things like swipe login and finger print authentication than ever before.

But what will 2016 bring?


Mobile Payments to be Default for Consumers

2015 has seen the rise in things like Apple Pay and Samsung Pay hitting the consumer high street with venom.  Many retail outlets now provide the ability to "tap and pay" using a mobile device, with many banks also offer…

Customer Data: Convenience versus Security

Organisations in both the public and private sector are initiating programmes of work to convert previously physical or offline services, into more digital, on line and automated offerings.  This could include things like automated car tax purchase, through to insurance policy management and electricity meter reading submission and reporting.

Digitization versus Security

This move towards a more on line user experience, brings together several differing forces.  Firstly the driver for end user convenience and service improvement, against the requirements of data security and privacy.  Which should win?  There clearly needs to be a balance of security against service improvement.  Excessive and prohibitive security controls would result in a complex and often poor user experience, ultimately resulting in fewer users.  On the other hand, poorly defined security architectures, lead to data loss, with the impact for personal exposure and brand damage.