Cloud Safari – investigate the surroundings

Investigate the surroundings

“Live with your head in the clouds, as long as you keep your feet steadily planted on solid ground!” This is the shortest possible version of the initial investigative phase of your Cloud Safari. If you feel that things are all clear then stop reading now. I had a feeling you would continue. Thank you for your attention. Let’s tackle the longer version then.

Independent of your organizations size, there are two main inputs you need to be able to succeed in your strategy endeavor:

  1. Your current IT Capabilities – Excellent article that is very relevant today can be found on TechRepublic
  2. Your IT Costs (per annum) – Excellent book on this topic is “A practical guide to Reducing IT Costs”

By having that input you are equipped with raw material that helps you understand the potential problems that Cloud Computing can solve for you. Assuming you have that information you need to understand the business model, benefits and risks behind each of the Cloud delivery models. On the highest level you can find financial, technological, operational and environmental benefits. From a risk perspective you can face internal/external security risks, data protection failures, cloud outages, vendor lock-in, data loss, vendor failure and contract failure. A brief illustration of the process is outlined below.

Business review

Perhaps the case for Cloud Computing emanates from one separate business function or division? As long as it is one separate project it will be manageable and you can draw a lot of conclusions from the process. The problems arise when dozens of initiatives pops up from all over. This can lead to unwanted consequences. Formulating a cloud strategy and doing a concerted effort is the preferred way of going forward.

The key tips to get you started:

  • Review the key drivers, objectives and the positive/negative impact criteria that those business functions/divisions have decided upon.
  • Map them to your overall business and you IT Capabilities.
  • Engage those volunteers that are in the frontline as change leaders.
  • Identify employees from all parts of your business to be change evaluators.

Now you have a high-level map, a risk matrix and a team of eager souls betting on a change. Congrats! You have successfully completed the first stage.

Next article will present some musings on the roles within the team and a schizophrenic change leader that you will depend upon.

By Predrag Mitrovic

Predrag is also the Chief Inspiration Officer and Owner of MyNethouse.se.

Sorry, comments are closed for this post.

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Even Companies With A “Cloud First” Strategy Have Lingering Security Concerns

Lingering Security Concerns Considering the cost and time-to-market advantages of SaaS applications in particular, it’s no surprise that companies are looking to the cloud to meet their business objectives. But what happens when a ‘cloud first’ company must also put security and compliance first? In a recent Bitglass survey report from a cloud access security…

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks!

The Conflict Of Net Neutrality And DDoS-Attacks! So we are all cheering as the FCC last week made the right choice in upholding the principle of net neutrality! For the general public it is a given that an ISP should be allowed to charge for bandwidth and Internet access but never to block or somehow…

5 Tips For Building A High Growth IT Platform

5 Tips For Building A High Growth IT Platform

5 Tips For Building a High Growth IT Platform Building and maintaining today’s enterprise computing platforms is a lot more challenging than it was in the past. The competitive and fast moving nature of business requires a corporate network capable of meeting a company’s ever changing needs and requirements. For IT, this poses difficult challenges…

Are You Sure You’re Ready For The Cloud?: Connectivity

Are You Sure You’re Ready For The Cloud?: Connectivity

Cloud Connectivity Many times when we think of “cloud” we think of the elastic compute and storage, but we forget one very important thing, connectivity. Even though connectivity is no part of the cloud itself, it does have a direct bearing on how we access it, use it, and play around with it. If our…

IoT (Internet of Things) – Don’t Forget The Milk

IoT (Internet of Things) – Don’t Forget The Milk

Don’t Forget The Milk More on the Internet of Bling and some thoughts on the IoT of tomorrow… Last month I talked about the wearable IoT concept of the Internet of Bling. So what is more fashionable than an LED that blinks different colors based on the ambient temperature of the room? Blue when the…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Principles For Data Protection In The Cloud In 2016

Principles For Data Protection In The Cloud In 2016

Data Protection In The Cloud 2015 ushered in the start of a data economy. As organizations amass more detailed consumer profiles they have begun realizing that data could equal or surpass the value of the products and services they sell, especially in the Internet of Things era with its constant and very personal streams of…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising