Oracle users are set to take their first steps into the cloud according to a survey from the UK user group With many companies expressing concerns about committing to cloud computing one group of users appears to have no such worries.Cloud Computing: 2011 PredictionsAccording to research conducted by the UK Oracle User Group (UKOUG), in conjunction with Fujitsu, nearly two-thirds of Oracle users are either using cloud services or planning to in the next year. On top of this, 32 percent of users said they were considering cloud projects but not in the coming year; only seven percent of companies had no plans to use them at all.There does, however, appear to be wide discrepancy as to what cloud services means. For over half of the respondents who said they were using cloud, it means Software-as-a-Service, while for 21 percent cloud means Infrastructure as a service and only 3 percent use cloud as a platform as a service. And despite the positive comments about the technology, respondents to the survey still had several concerns about adopting cloud services. Top of the list were governance obstacles, contractual restrictions, integration with own enterprise systems and vendor lock-in.Ronan Miles UKOUG chairman said: “The results of the survey are very useful to ensure that UKOUG can continue to adapt and adopt services that support its member base in obtaining the best from its investment in IT and Oracle in particular. The industry is undergoing great change and providing intelligence to support our members’ needs alongside the industry in general helps ensure that. I am particularly thankful for the support Fujitsu gives the user group, both in terms of this survey and others – such help freely given is what community is all about.” Related content brandpost Proactive OT security requires visibility + prevention You cannot protect your operation by simply watching and waiting. It is essential to have a defense-in-depth approach. By Austen Byers Sep 21, 2023 4 mins Security news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe