{"id":258,"date":"2010-05-24T00:00:00","date_gmt":"2010-05-24T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/24\/another-study-sees-value-in-cloud-computing\/"},"modified":"2021-12-30T11:36:52","modified_gmt":"2021-12-30T11:36:52","slug":"another-study-sees-value-in-cloud-computing","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2010\/05\/24\/another-study-sees-value-in-cloud-computing\/","title":{"rendered":"Another Study Sees Value in Cloud Computing"},"content":{"rendered":"<p>Cloud computing is one of those topics that often elicits a mixed reaction in the tech world.  Despite any concerns among IT pros, cloud computing is here to stay and is likely to hook itself even deeper into the business world, according to the results of a March survey by Sand Hill Group.  As an advisor to market leading companies, Sand Hill interviewed more than 500 IT executives to gauge their opinions and deployment plans on cloud computing.  Though certain challenges were found, the survey &#8220;Leaders in the Cloud&#8221; painted an overall rosy picture of the ability of cloud computing to help cut costs, boost return on equity, improve reliability, and even enhance the image of IT within a company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The in-depth interviews discovered that cloud computing, though in its early stages, is already benefiting companies.<\/p>\n<p>Almost half of executives interviewed said that cloud solutions help them reach business goals with greater flexibility and innovation.<\/p>\n<p>Among those, 22 interviews were done with CIOSs, VPs, and technology directors at small, medium, and large companies across a variety of industries.<\/p>\n<p>There are gaps between the technology itself and the products being offered by vendors as well as cultural and organizational challenges with IT.<\/p>\n<p>http:\/\/it.tmcnet.com\/topics\/it\/articles\/86228-another-study-sees-value-cloud-computing.htm<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-258","post","type-post","status-publish","format-standard","hentry","category-cloud"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/258","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=258"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/258\/revisions"}],"predecessor-version":[{"id":2745,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/258\/revisions\/2745"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=258"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=258"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=258"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}