Cloud Control

In the second of a two-part series, CT looks at how IT professionals can make the business case for cloud computing while addressing ongoing concerns about taking their institutions into the cloud.


Illustration by Anthony Freda

Given some of the hype, you could be forgiven for thinking that the cloud holds the answer to everything, even cancer. In truth, some of the claims--massive savings, leaner IT staffs, fire-and-forget utilities--should come with asterisks attached. At the same time, there is good reason to be excited about what the cloud can do for institutions in higher ed, particularly in these straitened times. For many IT shops, the cloud offers an opportunity not only to improve operations but also to align themselves more closely with their schools' strategic goals.

The cloud is not a plug-and-play proposition, however--it's a complex, evolving landscape that demands your full attention. Security, privacy, contracts, and contingency planning are all issues that must be addressed. Here in the second installment of our two-part series, CT analyzes the financial aspects of a move to the cloud, as well as potential stumbling blocks.

Table of Contents

Making the Business Case for the Cloud
Cloud Strategy: Look Before You Leap
How to Plan a Cloud Initiative
Virtualization and the Cloud: NOT the Same Thing

Don't miss part one of our series, "Diving Into the Cloud," a guide to the basics of cloud-based services and how the cloud can improve campus operations.

About the Authors

Rama Ramaswami is a business and technology writer based in New York City.

David Raths is a Philadelphia-based freelance writer focused on information technology. He writes regularly for several IT publications, including Healthcare Innovation and Government Technology.

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Jennifer Skelly is a freelance journalist and screenwriter based in Los Angeles, CA.

Featured

  • network of transparent cloud icons, each containing a security symbol like a lock or shield

    Okta, OpenID Foundation Propose New Identity Security Standard

    Okta and the OpenID Foundation have announced the formation of the IPSIE Working Group — with the acronym standing for Interoperability Profiling for Secure Identity in the Enterprise — dedicated to a new identity security standard for Software-as-a-Service (SaaS) applications.

  • UIUC Study: AI Agents Can Exploit Cybersecurity Vulnerabilities

    In a new study from the University of Illinois Urbana-Champaign (UIUC), researchers demonstrated that large language model agents can autonomously exploit real-world cybersecurity vulnerabilities, raising critical concerns about the widespread deployment and security of these advanced AI systems.

  • IBM and Microsoft Partner on Cloud Security

    IBM and Microsoft have announced a "strengthened cybersecurity collaboration" aims at fortifying their joint customers' cloud environments.

  • scene in a cybersecurity operations center, showing an AI and a human competing head-to-head

    91% of CISOs Say AI Will Outperform Security Pros

    A new survey of CISOs by Bugcrowd indicates AI is already beating security pros in some areas and is expected to take on a larger role in the future.