Lead Image © Oksana Stepanenko, 123RF.com

Lead Image © Oksana Stepanenko, 123RF.com

Risky Business

Welcome

Article from ADMIN 71/2022
By
For all the fear, uncertainty, and doubt still surrounding cloud technologies, you must take a level of acceptable risk to move forward.

I find it infinitely frustrating to hear a technology person complain about cloud computing. They usually state security as the biggest hurdle to their adoption. I agree that security is a major problem with cloud technologies, but it's no more of a problem than with any Internet-exposed service. Every service that "faces" the Internet is less secure, but you must accept certain risks to be able to function and move forward in business and your personal life. The cloud is a tool and an asset, but many of you probably disagree.

The cloud, for me, is a means of getting things done no matter where I am or which device I'm using. Cloud applications allow me to work on any device, even a borrowed one, without having to reset my entire environment or get used to someone else's configurations and settings. Before having cloud applications to manage my passwords, infrastructure, backups, contacts, mobile applications, and creative application suite, I had to carry around a fully loaded laptop computer with a local password manager or text file full of credentials rather than a small netbook or Chromebook containing little more than an operating system.

A few years ago, my wife bought me a Chromebook. Being an experimental type of person, I decided to use only that Chromebook, and nothing else, for one month to see if someone could truly be 100 percent reliant on it and the cloud for everything. I'm happy to report that it worked. I edited documents and created and edited images, podcasts, and video files on the Chromebook with web-based and cloud-based applications. I also had the peace of mind of knowing that if I lost the laptop, my information would be safe. The opposite would be true with a standard laptop. I prefer to "travel light," and web-based and cloud-based applications allow me to do so with confidence.

Sure, one of the downsides of operating purely in the cloud means you must make some sacrifices, such as having limited

...
Use Express-Checkout link below to read the full article (PDF).

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Welcome to ADMIN
    If you haven't either used or experienced Chromebooks firsthand by now, you soon will. Chromebooks are the next frontier in IT management and support, and they're coming soon to a network near you. The primary reasons for the soon-to-be widespread adoption of the humble Chromebook are cost, flexibility, security, and portability. But most of those reasons are the "business" reasons driving adoption.
  • Identity Management from the cloud
    Offers for identity management as a service (IDaaS) are entering the market and promising simplicity. However, many lack functionality, adaptability, and in-depth integration with existing systems. We look at how IT managers should consider IDaaS in their strategy.
  • Goodbye Google Cloud Print
    With the discontinuation of Google Cloud Print, we look at printing going forward in the enterprise.
  • Overview of cloud platforms and appliances
    The current trend toward cloud computing is obfuscated by a cloud of buzzwords and acronyms. Pushing the buzzwords aside, we take a look at the nitty gritty of the current crop of offerings.
  • Recovering from a cyberattack in a hybrid environment
    Restoring identity is an important part of disaster recovery, since it lays the foundation for restoring normality and regular operations. We look into contingency measures for hybrid directory services with Entra ID, the Graph API, and its PowerShell implementation.
comments powered by Disqus