ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

2 Conflicting Views of the Cloud

b2ap3_thumbnail_cloud_gears_400.jpgCloud computing is here to stay. Yet, there are still companies hesitant to adopt the cloud. While every business that hesitates migrating to the cloud has its own reasons, one common source of conflict that we’ve seen is the opposing view between the business owner and their IT department.

This difference in view typically stems from the business owner being sold some big promises about how the cloud can revolutionize their operations, whereas IT personnel may be hesitant to relinquish too much control to the cloud. Granted, we have seen situations where the reverse is true, but for the sake of this article, let’s follow the logic of the former.

Benefits of the Cloud Promised to Business Owners
For business owners, the cloud comes with some pretty strong selling points. According to InformationWeek, here are three benefits to the cloud that get business owners excited about adopting the technology:

  • Business leaders see improved speed to market.
  • The ability to rent instead of own, especially as things relate to new ventures that might not be permanent.
  • The ability to rent infrequently used assets (like those for disaster recovery).

For the business owner, all three of these benefits speak to something near and dear to their heart: return on investment. If cloud computing can live up to the marketing promises that spew across a business owner’s desk, inbox, and social media timelines, then they’re going to gravitate toward the cloud and demand that their IT department implement it for business reasons, not technical reasons.

Reservations IT Departments May Have about the Cloud
Herein lies the all-too-common conflict between a business owner’s money-saving decision making and the guarded reservations that an IT administrator might have about making too dramatic of a change to their IT systems. InformationWeek goes on to explain the IT technician’s point of view:

  • Self-preservation: "Why should I support something that's going to put me out of a job?" Developers obviously don't feel this way. But folks responsible for racking-and-stacking? Of course they feel threatened by work being done in an Amazon or Google data center.
  • Span of control: Being responsible for outsourced infrastructure makes people feel like they're getting in trouble for someone else's mistake when that infrastructure is unavailable.
  • Disbelief: The line of thinking here is, "This is just a fad, it's not really going to help us, and we'll go to a lot of trouble for nothing."

At the end of the day, migrating a company’s IT infrastructure to the cloud is a major move that affects everyone, business owners and IT technicians alike. Therefore, both parties need to be on the same page about the cloud and have a clear understanding about what it can do, as well as why adopting it is in the best interest of the company.

ClearView IT is here to help communicate the benefits of cloud computing to both parties. As a managed IT company and a small business, we’re in a unique position to speak to the needs and understand the pain points of business owners and IT departments alike. To have a relevant conversation about cloud computing that takes into account these two perspectives and more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Passwords Disaster Recovery Holiday Covid-19 IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Internet of Things Managed Service Provider Remote Work Data Management Saving Money Operating System Government Artificial Intelligence Managed IT services Gadgets Workplace Strategy Networking Windows Spam Business Technology Blockchain WiFi Bandwidth Server Information Encryption Remote Mobile Device Management App Virtualization Office 365 Budget Employee/Employer Relationship Gmail History Office Apple Two-factor Authentication Information Technology Analytics Conferencing Cybercrime Wi-Fi Access Control Data Security Big Data BDR Health IT Management Document Management Remote Computing Training Hacker Save Money Compliance Patch Management Vendor Help Desk Employer-Employee Relationship Remote Monitoring Hacking Cost Management Voice over Internet Protocol Legal Hiring/Firing Outlook Managed Services Password Data storage Money Data loss Customer Service Unified Threat Management Firewall Augmented Reality Word BYOD IBM Applications Website Computing Search... Vendor Management Best Practice Hard Drive Project Management Vulnerabilities Retail Alert Mobile Office Printer User Windows 7 Free Resource Google Maps Scam How To Chrome Sports Travel Social VPN SaaS DDoS Virtual Reality Social Engineering Cryptocurrency Update Black Market iPhone Cleaning Mobile Computing Education Cortana Robot Data Breach Content Filtering Marketing Paperless Office Running Cable Antivirus Router Maintenance Storage Windows 11 The Internet of Things Monitoring YouTube Twitter Healthcare Websites Remote Workers Law Enforcement Meetings End of Support Mobility Laptop Software as a Service Managed Services Provider Data Protection Computers Bitcoin Virtual Private Network Downtime Telephone Hack Safety Identity Theft Notifications Current Events Unified Communications Virtual Desktop Google Docs Experience Excel Solutions Bluetooth Distributed Denial of Service Integration Office Tips Tech Terms Images 101 Private Cloud Display Memory PowerPoint Managed IT Administration Virtual Assistant Digital Disaster Presentation Employees Specifications Taxes Avoiding Downtime Politics IT Consultant Machine Learning Settings Lithium-ion battery Holidays Customer Relationship Management Processor Solid State Drive Co-Managed IT Processors Entertainment Cooperation Physical Security Video Conferencing Virtual Machines Chromebook Drones Computer Repair Automobile Multi-factor Authentication Start Menu Professional Services Computer Care Downloads How To Vulnerability Saving Time Wireless Technology Microchip HIPAA eWaste Flexibility Error Financial Data In Internet of Things Tablets intranet Bookmark Risk Management IT Wireless Hacks Scams Shortcut Network Congestion Supercomputer Piracy Heating/Cooling Writing Environment Google Calendar Term Google Apps Download Reliable Computing Virus Telework Windows XP HTML Business Owner Social Networking Browsers Smartwatch Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Scalability Software License Comparison Google Play Google Drive Upload Procurement Social Network FinTech Administrator Text Messaging Proactive IT Knowledge Data Analysis CES Corporate Profile Screen Reader IT Assessment Bring Your Own Device Point of Sale Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Television Security Cameras Customer Resource management Organization Cabling Devices Cyber security Inbound Marketing Shortcuts Music G Suite Tip of the week Fileless Malware Tablet Smart Devices Staffing VoIP Gamification Remote Working Tracking Company Culture IP Address Mouse Telephone System AI Botnet Regulations Trend Micro Be Proactive Web Server Transportation Micrsooft Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records Rental Service Electronic Payment Content Digital Payment Desktop Wasting Time Flash SharePoint Electronic Medical Records Worker Accountants eCommerce Telephone Systems Modem Workplace Strategies Business Growth Competition Phone System Videos Access Database Surveillance Recovery Time Management Public Cloud Managing Costs Health IT LiFi Equifax Banking SSID Entrepreneur Google Wallet Hard Drive Disposal Employer/Employee Relationships Application Deep Learning Audit Media Spyware Tactics Development Documents Messenger Username File Sharing Virtual Machine Business Intelligence Redundancy Reviews Startup Optimization Business Metrics Freedom of Information Smart Technology Hosted Solution Computer Accessories email scam Teamwork Navigation 2FA Cache Addiction Securty Books Unified Threat Management Data Storage Workers Mobile Security Hypervisor Domains Language Society User Tip Shopping Legislation News Medical IT CCTV SQL Server Monitors Visible Light Communication Printing Evernote Paperless Network Management Reading Touchscreen PCI DSS Licensing Windows 8 Emergency Proxy Server Gig Economy Emails Humor Computer Malfunction Fake News Supply Chain Computing Infrastructure Azure Public Speaking Displays Advertising Business Communications Vendor Mangement Service Level Agreement Internet Service Provider Relocation Management Regulations Compliance Streaming Media Samsung Device security Managed IT Service Work/Life Balance Troubleshooting Tech Support Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Keyboard Business Cards Hard Drives Tech Human Resources Business Mangement Going Green Net Neutrality

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?