Cloud Storage 2.0 Set To Dominate Market

Mobile device security: A new frontier for hackers

By G C Network | February 1, 2015

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized…

Learn How To Buy Cloud From GovLoop & ViON

By G C Network | January 28, 2015

“Government IT managers must accept that cloud computing services are services, not the purchases of technology. This usually represents a fundamental change in how technology is acquired and managed. Since…

A VETS 360 BENEFIT – LATINO FILM INDUSTRY POST OSCAR PARTY

By G C Network | January 21, 2015

   GUESS WHO SUPPORTS VETS 360? You can support them too at the: THE OFFICIAL LATINO FILM INDUSTRY POST OSCAR PARTY The Veterans 360 mission is to support our young combat…

South Asia’s Biggest Tech Event – “Digital World 2015”

By G C Network | January 19, 2015

 I am proud and honored to announce that I have been added as a speaker at SouthAsia’s biggest tech event “Digital World 2015” , 9th – 12th February, 2015 at…

Fear Hackers? First invest in an IT security culture change

By G C Network | January 14, 2015

by Kevin L.Jackson  With all the news these days about cyberterrorism and hacking the cloud may seem like the last place you would want to put your precious information. Pew…

CloudCamp Bangladesh In Dhaka! – February 11, 2015

By G C Network | January 13, 2015

Did you know that….. Goldman Sachs recognized Bangladesh as one of the Next Eleven (N-11) – a list of eleven countries having strong potential for becoming the world’s largest economies…

Agile is not the absence of ITIL!

By G C Network | January 12, 2015

 by Jodi Kohut ITIL (formerlyknown as the Information Technology Infrastructure Library) has been the best management practices framework of choice for world class IT Operations organizations.  The 5 stage framework:…

Cloud Security: Understanding the Cloud Computing Threat Landscape

By G C Network | January 10, 2015

In the last two years, IT security breaches have hit the White House, the State Department, the top federal intelligence agency, the largest American bank, the top hospital operator, energy…

Federal Cloud Computing Summit on January 14-15, Washington, DC

By G C Network | January 9, 2015

The Federal Cloud Computing Summit will be held on January 14-15, 2015 at the Marriott Metro Center in Washington, D.C. (Complimentary government and academic registration) This educational symposium will feature cloud computing…

CONGRATULATIONS! Inaugural Cloud Computing Class at Mira Costa College Graduates!!

By G C Network | January 8, 2015

Anthony Dorrah, Jose Chapman, Mike Chatelain,  Lisa Heiden, Ginelle Johnson, Robert Minson, Alfredo Morales  We are so proud of the success of out first cloud computing training class.  This group…

The enterprise data storage marketplace is poised to become a battlefield. No longer the quiet backwater of cloud computing services, the focus of this global transition is now going from compute to storage. An overview of recent storage market history is needed to understand why this transition is important.
 

 

Before 2007 and the birth of the cloud computing market we are witnessing today, the on-premise model hosted in large local data centers dominated enterprise storage.  Key marketplace players were EMC (before the Dell acquisition), NetApp, IBM, HP (before they became HPE) and Hitachi. Company employees managed information technology resources (compute, storage, network) and companies tightly controlled their data in facilities they managed. Data security, legal and regulatory concerns, for the most part, were very localized. The data itself was highly structured (i.e., Relational Databases and SQL) in support of serially executed mostly static business processes. This structured approach worked because consumer segments in most industries were homogeneous, segregated and relatively static.  Companies also felt relatively safe in their industry vertical due to the high financial and operational barriers prospective new competitive entrants would face.
 
 
On March 13, 2006, Amazon Web Services launched Simple Storage Service (S3). Although not widely appreciated at the time, that announcement was the launch of Cloud Storage 1.0 and heralded a gradual but steady global adoption of cloud-basedstorage services. Surveys show that by 2016 approximately 30% of all businesses had transitioned to cloud-based storage.  Although cloud compute service and application management were the primary reason for migrating to the cloud, the rapid growth of unstructured data (Social media, Hadoop, Big Data Analytics) significantlyheightened the importance of cloud-based storage. Rapidly changing business processes that increased the need to target smaller consumer segments (localization, online retail) also contributed to rapid data growth and breadth.  Over time Google, Microsoft, Rackspace, and other cloud storage vendors entered the market. Coincident with the transition to cloud storage, international data security, legal and regulatory concerns also grew. Even though the daily news greeted everyone with multiple high profile data breaches and data loss incidents, fines were minimal and very few mandatory notification laws existed. Cloud storage technology was characterized by:
  • Implemented through a 2005-2008 technology base;
  • Primarily being hosted on Linux or Windows operating systems;
  • The use of proprietary, incompatible and competing APIs;
  • The vendor selection also threatened vendor lock-in;
  • Additional charges for data manipulation activity (puts, gets, deletes);
  • A continuing requirement to manage multiple storage options and pricing tiers.

 

As if this was not challenging enough, vertical industry barriers were shattered by digital transformation and the elimination of significant startup capital investment requirements.
As we all prepare the champagne and noisemakers for the birth of 2018, Cloud Storage 2.0 is already with us. Massive transition to cloud computing has commoditized storage.  Industry observers’ expectations storage to become an IT utility.  Increased data volumes and the sourcing of unstructured data (Crowdsourcing, Social Media Analytics) have elevated the importance of previously benign enterprise storage technology decisions. Many business processes are now expected to be dynamically executed in a parallel fashion (Agile business, Social Media Customer Service). Blended consumer segments and need to target and satisfy individual consumers is common. There are also significant changes on the data security front. These changes include:
  • Significant fines for data loss or breach;
  • Mandatory data breach reporting laws; and
  •  Heightened international data security, privacy, legal and regulatory concerns (i.e., National data sovereignty Laws, BREXIT and EU General Data Protection Regulation (GDPR))

 

Corporate risk introduced by these dramatic changes means that cloud storage vendors need to drastically up their game as well. Customers no longer want to deal with continually balancing between the cost to store data and the risk associated with intentional deletion. In fact, expanding legal and regulatory requirements are now the driving force behind operational needs to execute real-time retrieval of complex data assets (i.e., biometrics, social media analytics, dynamic data streams). These needs mean that Cloud storage 2.0 minimum requirements now include:
  • Using new and improved purpose-built operating systems;
  • Native control of storage disk for higher density and faster access speed;
  • Solutions optimized for the storage and analysis of unstructured data;
  • Significant reduction of multiple storage tiers and options;
  • Elimination of separate charges for data manipulation activity (puts, gets deletes);
  • Storage immutability (data or objects cannot be unintentionally modified after creation);
  • Significantly reduced pricing; and
  • Use of standards-basedinterface APIs.

 

 

 

These are the many reasons why enterprises must think before accepting storage services from the current cloud industry leaders. Don’t settle for a Cloud Storage 1.0 band-aid when you should buy a Cloud Storage 2.0 solution. When your team is evaluating options:
  • Compare access speeds and select the vendor that can offer the fastest possible access;
  • Use storage with a pricing structure that allows you to retain all of your data for as long as needed;
  • Make sure your company is ready to meet the new data security regulations;
  • Choose cloud storage that is inter-operable across the most extensive ecosystem (partners, storage applications, formats); and
  • Always evaluate the solution’s scalability, durability, immutability, and legal compliance capabilities.

 

 

Change is happening now so don’t get fooled!


( This content is being syndicated through multiple channels. The opinions expressed are solely those of the author and do not represent the views of GovCloud Network, GovCloud Network Partners or any other corporation or organization.)

 

Cloud Musings

( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2017)

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network