The key issue unfolding at that time was the transfer of risk that resulted from moving to a cloud environment and the obstacles to security, performance and licensing that would need to evolve. But the genie was out of the bottle, as successful early adopters could see cost savings and rapid one-to-many monetization benefits of on-demand services.
A second key moment was the realization that the exchange of services was no longer a simple request and response. Social networks had demonstrated huge communities of collaboration and online "personas" changing individual and business network interactions, but something else had happened -- less obvious but more profound.
This change was made most evident in the proliferation of mobile computing that greatly expanded the original on-premise move to off-premise services. A key paper by Intel Research titled "CloneCloud," published around that same time period, exemplified this shift. Services could be cloned and moved into the cloud, demonstrating the possible new realities in redefining the real potential of how work gets done using cloud computing.
The key point was that storage or processing transactions, media streaming, or complex calculations no longer had to be executed within a physical device. It could be provided as a service from a remote source, a virtual cloud service.
But more significant was the term "multiplicity" in this concept. We see this everyday as we download apps, stream video, and transact orders. The fact was that you could do not only a few, but multiple tasks, simultaneously and pick and choose the services and results.
This signaled a big shift away from the old style of thinking about business services that had us conditioned to think of service-oriented requests in static, tiered, rigid ways. Those business processes and services missed this new bigger picture. Just take a look at the phenomenon called "hyperlocal services" that offer location specific on-demand information or how crowd sourcing can dramatically transform purchasing choices and collaboration incentives.
Traditional ways of measuring, modeling and running business operations are under-utilizing this potential and under-valuing what can be possible in these new collaborative networks. The new multiplicity-based world of cloud-enabled networks means you can augment yourself and your company's assets in ways that change the shape of your industry.
What is needed is a new language to describe how this shift feels and works, and how advances in your business portfolio can be realized with these modern ideas, often by examining current methods and standards of strategy visualization, metrics, and design to evolve a new expression of this potential.
Some two years have passed, and what has been achieved? Certainly we have seen the huge proliferation of services into a cloud hosting environment. Large strategic movements in private data centers seek to develop private cloud services, by bringing together social media and social networking through cloud technologies.
Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more
For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more
In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more
With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more