Big Data in the Cloud: Field of Dreams or Catch-22?

My good buddy Joe McKendrick at Forbes Magazine recently penned a thought-provoking piece: Cloud Providers May Not Be Ready For Big Data Onslaught, Users Fear. He?s right, of course ? many Cloud environments aren?t ready or able to handle the Big Data sets and corresponding analytics that many organizations are now looking to shoehorn into the Cloud. That conclusion, however, brings up two important questions: why aren?t the Cloud providers ready, and what are we going to do about it?

One line of thinking goes as follows: to build a Cloud properly, you need to offer unlimited elasticity, which builds upon the illusion of infinite capacity. There?s no such thing as infinite capacity, of course; but Clouds should be big enough to give their customers the confidence that they?re big enough for even the most gargantuan of Big Data challenges.

I call this the Field of Dreams scenario: if they build it, you will come. The theory is that Cloud providers will invest all the time and money necessary ahead of customer demand to ensure that when that demand finally comes along, they?ll be ready. Sounds good in theory, from the customer perspective. But from the provider perspective? Overbuilding. Unnecessary expense. In other words, bad business.

On the other hand, we may be in more of a Catch-22 situation. The providers are only too happy to build out their Clouds to meet customer demand, but the customers won?t demand that capacity until the providers offer it. The result: steamed customers who are wondering when the Cloud providers will finally get their act together. Providers who have misread the customer landscape, and have failed to predict the pattern of immanent demand.

Regardless of which movie you?re watching, Field of Dreams or Catch-22, customer demand and provider capacity aren?t lining up as efficiently as anyone would like. The answer? Give Adam Smith?s invisible hand some time to coax the market into balance, and in the meantime, let the buyer beware.

Share the Post:
Share on facebook
Share on twitter
Share on linkedin


The Latest

positive contribution tech

Technology’s Positive Contributions to Society

Technology has and continues to improve our lives. From the business world to the world of medicine, and our day-to-day lives, you can’t go a day without interacting with at least one form of technology. While some fear technology may be going too far, there are many ways in which

How to Choose From The Best Big Data Platforms in 2023

How to Choose From The Best Big Data Platforms in 2023

As big data continues to become increasingly popular in the business world, companies are always looking for better ways to process and analyze complex data. The process critically depends on the platform that manages and analyzes the data. In this article, we will provide a guide to help you choose

Why transparent code is a good idea

Why Transparent Code is a Good Idea

Code is used to make up the apps and software we use every day. From our favorite social media platforms to our online banking services, code is the framework used to build these tools that help make our lives easier. Code is complex. Software today requires large teams of programmers

The Role of WordPress Hosting in Website Speed and Performance

The Role of WordPress Hosting in Website Performance

The term “WordPress hosting” refers to a specific type of web hosting service that offers hardware and software configurations tailored to the needs of WP sites. It’s important to remember that a WP hosting package is not required to host WordPress webpages. WP web pages are also compatible with standard

Data Privacy vs. Data Security: What you Should Know

Data Privacy vs. Data Security: What you Should Know

Data privacy and data security are often used interchangeably, but they are two completely different things. It’s important to understand the difference for anyone who handles sensitive information, such as personal data or financial records. In this article, we’ll take a closer look at data privacy vs. data security. We’ll