{"id":40,"date":"2014-04-30T10:55:32","date_gmt":"2014-04-30T10:55:32","guid":{"rendered":"http:\/\/felhoszolgaltatas-blog.hu\/en\/?page_id=40"},"modified":"2014-05-20T06:53:37","modified_gmt":"2014-05-20T06:53:37","slug":"the-3-stages-of-cloud-computing-resistance","status":"publish","type":"page","link":"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/the-3-stages-of-cloud-computing-resistance\/","title":{"rendered":"The 3 stages of cloud computing resistance"},"content":{"rendered":"<p><strong><em>Some IT departments follow a familiar pattern when it comes to cloud computing &#8212; it&#8217;s time to change that<\/em> <\/strong><\/p>\n<p>How do many enterprise IT departments approach cloud computing? Their path mirrors that of a person going through the stages of grief: denial, anger, and acceptance.<\/p>\n<p><strong>Stage 1: Ignore the problem<\/strong><br \/>\nWhen retail-oriented public cloud providers began to emerge several years ago, there were those in the enterprise who needed ways to share and collaborate with colleagues on documents and files. They picked up cloud services by Box, Dropbox, Google, Apple, and others. Enterprise IT responded by &#8220;allowing&#8221; the use of these clouds, as long as it didn&#8217;t know about it &#8212; tech&#8217;s version of &#8220;don&#8217;t ask, don&#8217;t tell.&#8221;<\/p>\n<p><strong>Stage 2: Overreact to the problem<\/strong><br \/>\nMore recently, many IT organizations <span style=\"color: #000000;\">have <a href=\"http:\/\/www.infoworld.com\/d\/consumerization-of-it\/it-keep-your-hands-my-cloud-storage-186356\"><span style=\"color: #000000;\">cracked down on the use of personal clouds<\/span><\/a>, by enacting policies that explicitly forbid it, by blocking access altogether, or by doing both. Users had to go back to implementin<\/span>g &#8220;sneakernets,&#8221; emailing files, or adopting other less-than-productive approaches. In more enterprises than you&#8217;d suspect, users commonly bring in their own mobile hotspots to get around the corporate firewalls.<\/p>\n<p>Those in IT often argue that these clouds are inherently insecure, so they&#8217;re not to be used. I argue that users need a reasonable alternative to thumb drives, personal email, and sneakernet that IT can support, if not for the users&#8217; benefit, then to be more secure. These techniques are much less secure than using certain cloud services.<\/p>\n<p><strong>Stage 3: Solve the problem<\/strong><br \/>\nThe trick is to come up with a plan that includes the use of many popular services, but in secure and manageable ways. Figuring this out will take some time, some resources, and even some risk. However, if they&#8217;re done right, you&#8217;ll have happier and more productive employees.<\/p>\n<p><span style=\"color: #000000;\">The days of just saying no to every new technology that comes down the pike are over. The <a href=\"http:\/\/www.infoworld.com\/t\/consumerization-it\/the-real-force-behind-the-consumerization-it-181424\"><span style=\"color: #000000;\">current generation of enterprise users<\/span><\/a> is tech-savvy enough to use them anyway, if they make their work lives easier and\/or more productive.<\/span><\/p>\n<p><span style=\"color: #000000;\">This is not to say you&#8217;re obligated to use and support every kind of cloud technology &#8212; you <em>do<\/em> need<\/span> to control use and access. However, there should be policies that explain the why and how about cloud computing rather than issue a flat &#8220;no.&#8221; Drink some tea and relax; it will be OK.<\/p>\n<p>Source:<a href=\"http:\/\/www.infoworld.com\/d\/cloud-computing\/the-3-stages-of-cloud-computing-resistance-235575\" target=\"_blank\"><span style=\"color: #3366ff;\"> www.infoworld.com<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some IT departments follow a familiar pattern when it comes to cloud computing &#8212; it&#8217;s time to change that How do many enterprise IT departments approach cloud computing? Their path mirrors that of a person going through the stages of &hellip; <a href=\"http:\/\/felhoszolgaltatas-blog.hu\/en\/ez-egy-minta-oldal\/the-3-stages-of-cloud-computing-resistance\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":0,"parent":2,"menu_order":99,"comment_status":"open","ping_status":"closed","template":"","meta":{"spay_email":""},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P79beE-E","_links":{"self":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/40"}],"collection":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/comments?post=40"}],"version-history":[{"count":3,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/40\/revisions"}],"predecessor-version":[{"id":61,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/40\/revisions\/61"}],"up":[{"embeddable":true,"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/pages\/2"}],"wp:attachment":[{"href":"http:\/\/felhoszolgaltatas-blog.hu\/en\/wp-json\/wp\/v2\/media?parent=40"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}