{"id":1286,"date":"2017-11-21T14:30:09","date_gmt":"2017-11-21T19:30:09","guid":{"rendered":"http:\/\/kevinjgoodman.com\/?p=1286"},"modified":"2017-11-21T14:30:09","modified_gmt":"2017-11-21T19:30:09","slug":"cleveland-cloud-computing","status":"publish","type":"post","link":"https:\/\/kevinjgoodman.com\/index.php\/2017\/11\/21\/cleveland-cloud-computing\/","title":{"rendered":"12 Cloud Computing Trends and Tips"},"content":{"rendered":"<h1 style=\"text-align: center;\">12 Cloud Computing Trends and Tips<\/h1>\n<p style=\"text-align: center;\">What is the \u201ccloud\u201d phenomenon all about?\u00a0 You hear it constantly, but what does it mean and how is it used?\u00a0 I felt that it was important to summarize it in its simplest terms so that people across an organization could understand it and see how it can help them in their daily tasks.\u00a0 So here you will find 12 tips and facts to, not only help you understand what the \u201ccloud\u201d is, but also where it is going and how you can leverage it.<\/p>\n<p style=\"text-align: center;\">\u201cCloud\u201d has been a buzzword the last several years, and with good reason.\u00a0 The cloud is rapidly reducing costs and improving efficiencies for businesses globally.\u00a0 So what is all this talk of IT in the sky? In its simplest form, cloud consists of services and\/or software that are accessed through the internet instead of your local network. Cloud environments are best housed in highly available, fully redundant and compliant third party audited data centers and are built on enterprise hardware. It\u2019s safe to return to an old business axiom: When transformation occurs it brings new challenges; it also brings opportunity.\u00a0 Age-old tools of careful due diligence will help businesses make confident decisions in finding the right providers to launch them into this space.<\/p>\n<h2 style=\"text-align: center;\"><strong>Three Cloud Trends and Tips From Four Cleveland Experts<\/strong><\/h2>\n<p style=\"text-align: center;\">From Data Center Facility Based Cloud Operator, Kevin Goodman, Managing Director, Partner, <a href=\"http:\/\/www.bluebridgenetworks.com\/\">BlueBridge Networks<\/a><br \/>\n\u201cBusinesses must become comfortable understanding the stewards of its infrastructure and all it can gain from cloud utilization\u201d<\/p>\n<ol>\n<li style=\"text-align: center;\">Reasons to move to a cloud platform. Perhaps you are facing a hardware refresh, new levels of requirements of compliance and \/or law, or your company may wish to move towards applications that can drive and grow business. You may want to beef up your disaster recovery and business continuity strategies, be prepared to scale your IT to meet varying customer demands or allow your IT staff to work on the tasks for which they were originally hired (which in turns allows the company to focus on its business core competencies). Some of your business goals should be to connect your mission critical apps into facilities that have faster performance and higher security than your own.<\/li>\n<li style=\"text-align: center;\">\u00a0 \u00a0 Find a company that will work with you on a Proof of Concept (POC) and carefully and in phases fit it to the cloud.\u00a0 A POC will determine the feasibility of moving to the cloud; it can also be a useful tool to see how well companies work together. The last thing a company needs once it contracts with a service provider is the feeling that it is a hostage and not a customer<\/li>\n<li style=\"text-align: center;\">\u00a0 \u00a0Look for a cloud provider capable of moving you to a global economy. An important business consideration in today\u2019s fast-paced and ever-changing technology landscape is leveraging IT ecosystems.\u00a0 It\u2019s important to partner with groups that can understand business objectives and collaborate to meet and exceed your own.\u00a0 From CyberSecurity and Computer Forensics expert Timothy M. Opsitnick, Esq. <a href=\"https:\/\/www.tcdi.com\/\">TCDI<\/a> \u201cSecurity must remain a constant focus and practice\u201d:<\/li>\n<li style=\"text-align: center;\">Security is a snapshot at any given point in time but is constantly changing and therefore you need to remain vigilant during the entire relationship and perform security reviews on a periodic basis.<\/li>\n<li style=\"text-align: center;\">\u00a0 \u00a0Many breaches occur because third parties are entrusted with your data so make sure they understand your obligations and their obligations.<\/li>\n<li style=\"text-align: center;\">\u00a0Be practical and get started and forget about perfection but understand the differences between security and compliance.\u00a0 From Third Party T Auditor, Tom Aumiller,\u00a0Director of Information Tech.,\u00a0<a href=\"http:\/\/www.maloneynovotny.com\/\">Maloney + Novotny LLC<\/a> \u00a0\u201cIf your data is in the \u2018Cloud\u2019, compliance is part of your business\u201d<\/li>\n<li style=\"text-align: center;\">If you outsource a process involving data you are still responsible, make certain that you have strong policies and procedures in place to monitor third party providers with access to your data.<\/li>\n<li style=\"text-align: center;\">Requests for compliance are increasing and there are literally dozens of compliance frameworks, but they all share a pattern \u2013 make compliance a repeatable event and cross reference controls to the various metrics that apply to your business, such as SOC, ISO, HITRUST, PCI, etc.<\/li>\n<li style=\"text-align: center;\">\u00a0 Customers are raising the bar on compliance. Innovations in security are being suggested by your customers.\u00a0 Keep your sales force educated and part of the IT discussion &#8211; make certain that dialog between your departments (IT, Business Development, Operations, and Security) is ongoing. From leading Attorney Michael D. Stovsky,\u00a0Partner Chair, Innovations, Information Technology and Intellectual Property Group Member of Executive Committee, <a href=\"http:\/\/www.beneschlaw.com\/\">Benesch, Friedlander, Coplan &amp; Aronoff LLP<\/a> \u201cSome Legal Must Haves for Cloud Deals\u201d:<\/li>\n<li style=\"text-align: center;\">Data security and privacy compliance must be appropriately considered and negotiated in to agreements with all cloud vendors.<\/li>\n<li style=\"text-align: center;\">\u00a0Effective service level agreements are a must for agreements with all cloud vendors \u2013 more than securing an agreement to \u201ctry real hard\u201d and attempt to achieve \u201ctarget\u201d service levels, these agreements should include bona fide commitments and remedies with teeth for failure to achieve required service levels.<\/li>\n<li style=\"text-align: center;\">More and more it is becoming \u201cmarket\u201d to backload payment obligations to go-live or to structure payment obligations for cloud based services in arrears.\u00a0 Both are recommended as a more effective means of ensuring adequate service particularly when coupled with termination rights and other remedies.<\/li>\n<\/ol>\n<p style=\"text-align: center;\">By virtualizing your IT applications and infrastructure, your company creates an opportunity to become more efficient. Using a high-density cloud computing environment, your business also reduces its overall IT footprint.\u00a0 As you move toward the cloud, be sure to leverage the umbrella of your provider\u2019s audits and compliance to law and best practice.\u00a0 Reduce and eliminate single points of failure; bring your company to the outside world to remain highly reliable, available and secure. Enter the cloud layers, and find the right type and size for your organization.\u00a0 (Kevin Goodman is Managing Director and Partner with <a href=\"http:\/\/www.bluebridgenetworks.com\/\">BlueBridge Networks<\/a>, a cloud data center and managed services business headquartered in downtown Cleveland.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>12 Cloud Computing Trends and Tips What is the \u201ccloud\u201d phenomenon all about?\u00a0 You hear it constantly, but what does it mean and how is it used?\u00a0 I felt that it was important to summarize it in its simplest terms so that people across an organization could understand it and see how it can help [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1287,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4,5,6,7,9,12,13],"tags":[],"class_list":["post-1286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-cloud-computing","category-cybersecurity","category-data-center","category-operational-excellence","category-security","category-technology"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/kevinjgoodman.com\/wp-content\/uploads\/2017\/11\/20171115_132401.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/1286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/comments?post=1286"}],"version-history":[{"count":0,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/posts\/1286\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media\/1287"}],"wp:attachment":[{"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/media?parent=1286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/categories?post=1286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kevinjgoodman.com\/index.php\/wp-json\/wp\/v2\/tags?post=1286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}