Cloud Safari – investigate the surroundings

Investigate the surroundings

“Live with your head in the clouds, as long as you keep your feet steadily planted on solid ground!” This is the shortest possible version of the initial investigative phase of your Cloud Safari. If you feel that things are all clear then stop reading now. I had a feeling you would continue. Thank you for your attention. Let’s tackle the longer version then.

Independent of your organizations size, there are two main inputs you need to be able to succeed in your strategy endeavor:

  1. Your current IT Capabilities – Excellent article that is very relevant today can be found on TechRepublic
  2. Your IT Costs (per annum) – Excellent book on this topic is “A practical guide to Reducing IT Costs”

By having that input you are equipped with raw material that helps you understand the potential problems that Cloud Computing can solve for you. Assuming you have that information you need to understand the business model, benefits and risks behind each of the Cloud delivery models. On the highest level you can find financial, technological, operational and environmental benefits. From a risk perspective you can face internal/external security risks, data protection failures, cloud outages, vendor lock-in, data loss, vendor failure and contract failure. A brief illustration of the process is outlined below.

Business review

Perhaps the case for Cloud Computing emanates from one separate business function or division? As long as it is one separate project it will be manageable and you can draw a lot of conclusions from the process. The problems arise when dozens of initiatives pops up from all over. This can lead to unwanted consequences. Formulating a cloud strategy and doing a concerted effort is the preferred way of going forward.

The key tips to get you started:

  • Review the key drivers, objectives and the positive/negative impact criteria that those business functions/divisions have decided upon.
  • Map them to your overall business and you IT Capabilities.
  • Engage those volunteers that are in the frontline as change leaders.
  • Identify employees from all parts of your business to be change evaluators.

Now you have a high-level map, a risk matrix and a team of eager souls betting on a change. Congrats! You have successfully completed the first stage.

Next article will present some musings on the roles within the team and a schizophrenic change leader that you will depend upon.

By Predrag Mitrovic

Predrag is also the Chief Inspiration Officer and Owner of MyNethouse.se.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be implemented fairly quickly, and 3) Companies have realized the great benefits IAM solutions bring to their organization. As the IAM…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are taking steps to improve data security, few are considering the most likely cause of such a threat: human error. According…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more complicated across public cloud models where there is shared ownership. As key business stakeholders in your company can you attest…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of your control. But in order to effectively provide quality services with the focus on the customer, providers need to ensure…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical configurations. The smart network layer may be the leading component that is tasked with the need to automatically learn the…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation and more recent technological advances, such as use of the cloud, have began to make their way into schools. Teachers…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are really two things forcing us to look at disaster recovery differently across the board. On the one hand the sheer…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken availability far beyond the simple act of voice-to-voice communication, allowing businesses to untether employees from their desks and give them…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully select migration vendors to help you get there. All that remains is following the plan, right? Everything going well, your…