Você está na página 1de 7

CA Technologies: Bringing the

Cloud to Earth

1. Development, growth and adoption of cloud technologies


over last decade. Projected Growth
Introduction to Cloud
Amazon enters cloud market Introduced Elastic Compute Cloud
Google, Cisco, Microsoft, Myspace entered into cloud

20002005
2006
2008
20082009

Use of private clouds due to privacy concerns

20092012

Cloud computing finds its niche market


Hybrid cloud introduced

2011

Adoption of Cloud Technologies:


19% of the average large U.S. companys applications, 12% in Europe, 28% in AsiaPacific, and a healthy 39% in Latin American companies
Projected Growth: Cloud-related tech spending by businesses is forecast to triple
from 2011 to 2017

2. What challenges do you think CA Technologies will face in


moving from its conventional solutions offerings to adopting
cloud technologies and offering new solutions for their clients.
85% revenues came from Top 1000 large corporations and they will
be more sceptical to adopt cloud technologies due to huge costs &
risks involved in adopting to such internal IT transformations .

The Kind of User Interface experience the end user will perceive &
their acceptance to the new Interface remains a big challenge.

The security issues in cloud computing is under debate and can post a
threat on organisation's purchase decisions.

Integration of cloud computing with organisations core strategy and


to its various domains of operations also remains a challenge.

The biggest challenge is to communicate the CA Technologies'


strategy & transformations to customers without destroying the sales.

2. What are the likely changes to its structure, systems, and


people?
A) In 2009 (Traditional Vertical Structure)
People were less interactive across units and only sales and marketing
were cut across all areas, and thus because of this poorly organised
structure, it was extremely difficult to make any decisions like that of
cloud computing. Also, this traditional vertical structure was internally
focussed.
B) In 2011 (Product Focused Approach - Cross Functional Team)
Growing the mainframe business, Developing SaaS, Leading security,
and Developing virtualization products became the four strategic pillars
of the firm. This new structure, which was primarily product focussed,
increased the interaction between employees leading to improved
performances. Also, all the aspects of CA technologies cloud offerings
became the fifth focus area of the firm.

3. Advantages and Disadvantages of using Cloud


Computing
Applications can be shared
throughout via a public or
private network.
Enterprises need not own
and operate the required
software anymore, thus
saving huge costs.

Cloud computing would provide a smooth


assemblage of the various IT factors :
pervasive virtualization, fast application and
service provisioning, low touch management
and ease of movement of work load between
locations.

Economies of scale would persist, i.e. if a


company extensively uses cloud computing,
they would become economically efficient.
There would be no boundaries of
sharing the data among its own
counterparts all over the world.

As the enterprise IT systems


would be running both on cloud
and in the company systems,
costs would increase and control
would be a bit difficult.
Switching costs and time would be very
high, plus the security and compliance
of company information was also a
concern

4. Addressing the doubts and anxieties of clients regarding


security and confidentiality of data in using the new
technologies (clouds)?
Introduce the terms and conditions that would impose liability on CA
Inc in the case of security system being failed and therefore leading to
violation of data privacy of client.
Also, the important data that the clients put on cloud might be lost
due to several factors such as network outages etc. However to secure
it against risk, elaborate data redundancy measures could be possibly
added which would have data mirrored across two data centers and
therefore reduce the risk of loss.
Data encryption algorithms could be used in order to safeguard
against data corruption and data theft on cloud.

Você também pode gostar