Print this Page
1.6 Architect
04. Cloud Strategy
Close this Page

1.6.04 Cloud Strategy:
The strategy, mission and objective is to significantly reduce the cost of computing so much more automation can be applied to help businesses become even more productive.   This involves change where each change is a step towards lower long term costs and improved productivity.
Every business can understand the benefits of being lean and agile, but people tend to create empires with shadow functions that may not be very effective and a structure that is not able to cease new business oppoertunities and not able deliver on improvement initiatives.   The strategy is to enable a business to be lean by maximising automation and to enable a business to be agile by delivering continual improvements.   By definition, this strategy will not appeal to empire builders who are not motivated to do more with less.

CRM:
CRM is your advanced address book and the center of much of what you do.   All customer, supplier, business associate, friend, family and personal data is generically called CRM.
Messaging via shared messages, email, text and other methods are a fundamental part of CRM.   All messages, no matter how they were delivered are part of the same CRM messaging service.   A critical customer message cannot get lost in a private inbox because business data may be shared by team and department.
Calendaring, diary, alarms and task management are a fundamental part of the same CRM workflow service.   What and when tasks are done and scheduled for the future are continually being updated for all devices for all shared users.   Trip and call reports are part of task management with all data shared for management information of who did what and when.
A pair of detailed audit trails are always recording what a person changes and what is changed by a person - by interlocking this read-only data, every change can be verified from the data that is changed and by the activities of the user.   It is said to be impossible to fool this pair of interlocking audit trails, even when a user is signed on and making changes via multiple devices at the same time.   Every field value is always identified with a specific person at a defined date and time.

Data Policy:
All data is always stored in the cloud and replicated to many encrypted cloud locations.   Data locations are secret to minimise the threat of a targeted attack to steal, corrupt of fraudulently change the data.   It is hard to purportrate a fraud when all the many locations that data is replicated is not known.
No data is ever stored on a computer, tablet, memory stick, CD, DVD or smart phone that will be lost or stolen.   An encrypted DVD copy of certain data may be downloaded periodically for comfort and fallback purposes.
Photographs are uploaded to the cloud and stored with all your documents and other data.   Your music and movies are in the cloud and available to all your computers, tablets, smart phones at the same time.
No data can be deleted, lost, overtyped or corrupted - ever.   The Data Protection Act defines the natural life cycle of data and that data must be automatically destroyed in accordance with the Act.   No facilities are provided for a human to impact on this strict data policy.   Because data is encrypted across many remote secure locations, it would be virtually impossible for a person to delete all copies of any data.
No user can ever say that they have lost a critical business document or message, because all data is replicated to many remote locations in real-time.   No user can overtype an existing document to cause the original data to be lost because a full history audit trail of every document and every change is always retained.

FLASH Problem:
While all vendors are committed to replace FLASH with HTML-5 movie facilities, this has not happened yet.   For a few more years, the FLASH add-on to browsers may be needed, but eventually this security risk will be eliminated.
All browser add-ins are a serious security risk that should be avoided - do not install any extra tool-bars.   Even the Google tool-bar can double your processing power overhead and slow your computer down to a crawl - most tool-bars are many times worse and do create an avoidable security risk.   Every tool-bar will monitor all your computer activities and send details to vendors - even your banking statement details will be monitored and sent to these vendors.

PDF Problem:
While all vendors are committed to replace PDF with HTML-5 documents, this has not happened yet.   For a few more years, a PDF reader add-on to browsers may be needed, but eventually this security risk will be eliminated.   The majority of security vulnerabilities that have been used for the last 5 years have had a PDF related cause - PDF was designed in the era when security was not an issue.
A PDF to HTML document conversion service is provided in the cloud so people only need to view safe HTML pages without unsafe imbedded PDF logic.

 
Software:
No software is ever installed on any computer, tablet or smart phone.   Installed softeare will increase costs, will increase technical support costs and will cause operational problems that could have been avoided.
When no software or data is stored on a device, then the possibility of that device being attacked by malware is virtually eliminated.   The cost of malware prevention and removal can be eliminated when nothing is permitted to be downloaded and installed.
All Office tasks can be moved to the cloud and incorporated into the CRM package.   Documents are created in the cloud, stored in the cloud, shared with others in the cloud and emailed to outsiders.   All your documents are always available on all computers, tablets and smart phones that you are using.
Anti-virus software is of little significance because all downloads of data and software are prevented so malware canot get installed.   Because software is not installed, only the core operating system needs automatic updates.

Hardware:
The operating system on any computer, tablet or smart phone is of little significance.   A business can operate with each person using any number of devices of any kind without any problems.
Any browser that supports HTML version 5 standard is good enough - this includes every major browser in use.   Advanced HTML-5 facilities such as movies are not used and will not be used until most browsers are able to support this option.
Computer processing power and disk space is of little significance because no software or data is stored on any local computer.   The cheapest utilitarian computing devices can be deployed without concern - costs can be reduced to a minimim.   By reducing processing power and disk space, battery life can be extended to all day working.