Cloud computing: Information anywhere anytime

by

Based on stats collected by Internetworldstats.com about 35 percent of people in the world have access to the Internet today. There’s another 4.5 billion plus people to go before the Internet is a completed world-phenomenon. But for the estimated 2.4 billion people using the Internet today, there’s a lot of change coming.

Children born into developed countries in the year 2000 do not know of a world without the Internet. Libraries, card catalogs, radio, magazines, newspapers and television will all be different in 2020, and by 2040 these sources of information may no longer exist — as we know them today.

Social networking and Wiki’s are introducing new methods to publish and share information that will dwarf the world’s store of books, magazines, newspapers and television footage created prior to the year 2000. Two of the big social networks – Facebook and Paxo – combined are estimated to have more than one billion users. Add in the hundreds of other social networks around the world and the number of socially interconnected people approaches two billion.

Information anywhere anytime is being further ushered along with the adoption of multi-function devices such as smart-phones, touch-pads and tablets, all of which are projected to surpass shipments of PC, laptops and Netbooks by the end of 2012 (see the Morgan Stanley research presentation delivered by Mary Meeker.

Smart-phones of today may appear rather dumb by 2015 and downright stupid by 2020 as new technologies, new applications and lower prices combine to reach hundreds of millions, if not billions of people.

On-premises IT assets of today will not look like tomorrow’s business with off-premises IT assets, applications and information on application-http-steriods. Called Cloud Computing, it looks like timesharing on the scale of the Internet.

Get ready for the information anywhere anytime revolution; it promises to be beneficial to people, businesses and governments, if the security, risk and control issues can be tamed. Wiki-leaks are likely to be followed by many-more-leaks, until and unless the security, risk and control problems are tamed.

Data published by the Open Security Foundation shows 80 percent of lost or stolen sensitive information is due to web hacks, attacks, email hacks, viruses, stolen disk drives, stolen laptops, stolen media, and lost devices and media. None of these risks are going away with Cloud-computing. In fact, the likelihood that sensitive information is lost or stolen probably increases as Cloud-computing applications, information, and alternatives are more widely adopted.

Information anywhere anytime is appealing for many reasons, including lower costs, improved agility, reuse of capital for core-business initiatives, and much greater market-reach. It’s a trend that is overwhelming in its utility for businesses and consumers alike.

Just remember: your information anywhere anytime can and will easily become someone else’s information anywhere anytime. Fund the business risk, IT governance, security and control initiatives that are needed to protect your information anywhere anytime, or you too will experience your-own-leaks.

Related research
How the Masters of IT Deliver More Value and Less Risk

What Color Is Your Information Risk – Today?

Assessments@ITPolicyCompliance
Want to find out how your practices for policy and information controls are impacting your finances? Try the two-minute Assessments@ITPolicyCompliance.

Advertisements

Tags:

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s


%d bloggers like this: