Pipeline Publishing, Volume 7, Issue 1
This Month's Issue:
Into the Cloud
download article in pdf format
last page next page

OSS Enabling the Cloud

back to cover

article page | 1 | 2

Even more recently, an iPad related security leak caused a fair amount of grief for Apple, AT&T, and iPad users. The hackers weren’t malicious, it seems, but rather looking to check the system for weaknesses so that AT&T could subsequently correct them. Furthermore, they got email addresses rather than heavily sensitive financial data. Still, it’s bad for the entire technology when InformationWeek Security blogger Jim Rapoza was led to declare that the “Cloud is Real Culprit in iPad/AT&T Security Hole” as he did on InformationWeek’s site a few days ago.

And there are other security concerns, as well. Especially if the cloud is being leveraged in the enterprise space, where the big revenue opportunities lie.

“The enterprise customer is different from the regular consumer,” said Sean Kelley, Global CIO of the Asset Management Division of Deutsche Bank, to the attendees at Management World in Nice last month. These differences, he said, create barriers for enterprise cloud service adoption. Of these barriers, “number one is security,” Kelley said. “We’re a highly regulated industry, as are similar enterprise customers, and we have to worry about, specifically in financial services, things like SOX, HIPAA requirements and other kinds of security requirements.”

Recently, an iPad-related leak caused grief for Apple, AT&T, and iPad users.


data isn’t being well-taken-care-of by every party that can touch it, we can go a long way towards improving the viability of the cloud. Psych 101.

And the cloud is not, at present, as standardized as it could be. That’s one area that the TM Forum is attempting to take a lead on. I spoke to Matt Edwards, the head of the Forum’s Cloud Services initiative, in Nice, and he assured me that the challenges of regulation and security are being considered and addressed, and that the Forum is working with other industry organizations like ITIL to drive standards for the cloud space.

However, all of these possible weaknesses and imperfections could be viewed as opportunities for CSPs and OSS/BSS vendors to work together to develop a cloud environment that works. A cloud environment that’s as tightly sealed and reliable as any system can be.

Vendors are certainly embracing the space. But how deep does it go? Is it meaningful interest, or just more lip-service like the stuff I mentioned in the lead-in to this piece?


And the list of worries goes on. “We have to worry about data traveling across country borders. We have to worry about resilience and disaster recovery. We do have to have control, because we’re ultimately, from a fiduciary standpoint, responsible for our environments, even if they’re in the hands of a third party.”

Which gets at one of the underlying aspects of cloud computing.

The distribution of computing power and storage also involves the underlying distribution of trust. This was a point underscored by other speakers at Management World, as well, including Thierry Zylberberg of France Telecom and futurist Gerd Leonhard.

Taking part in cloud computing means assuming that every link in the chain that has access to the data will be as secure and reliable as possible. To say that this involves trust may seem slightly abstract, but it gets at the heart of the issue. There is a visceral reaction by many to having sensitive data floating around through the cloud. If we can work to alleviate some of the worry that the


I’d say that it’s impossible to tell at this juncture. Let the technology hang around for a while. Let’s see some more mission-critical cloud rollouts in the sensitive enterprise market. Let’s see some tangibility.

Because that’s when we’ll be able to determine how much of this is hype and how much is reality.

After all, there are certainly security concerns with the cloud, but where do we see the real security blunders? Is it from hackers into cloud servers? Or is it from employees walking around with sensitive info on unencrypted laptops?

A power outage can cripple cloud servers for a while, but the information can survive, protected by redundancy. Can the same be said for a world without a cloud? Where what you have on location is all you have, period?

The potential is there. We just need to demonstrate that increasingly rare trait—an attention span longer than that of a sugar-addled 5-year-old—to see where buzzwords stop and reality starts.

article page | 1 | 2
last page back to top of page next page
 

© 2010, All information contained herein is the sole property of Pipeline Publishing, LLC. Pipeline Publishing LLC reserves all rights and privileges regarding
the use of this information. Any unauthorized use, such as copying, modifying, or reprinting, will be prosecuted under the fullest extent under the governing law.