Cloud Safari – investigate the surroundings

Investigate the surroundings

“Live with your head in the clouds, as long as you keep your feet steadily planted on solid ground!” This is the shortest possible version of the initial investigative phase of your Cloud Safari. If you feel that things are all clear then stop reading now. I had a feeling you would continue. Thank you for your attention. Let’s tackle the longer version then.

Independent of your organizations size, there are two main inputs you need to be able to succeed in your strategy endeavor:

  1. Your current IT Capabilities – Excellent article that is very relevant today can be found on TechRepublic
  2. Your IT Costs (per annum) – Excellent book on this topic is “A practical guide to Reducing IT Costs”

By having that input you are equipped with raw material that helps you understand the potential problems that Cloud Computing can solve for you. Assuming you have that information you need to understand the business model, benefits and risks behind each of the Cloud delivery models. On the highest level you can find financial, technological, operational and environmental benefits. From a risk perspective you can face internal/external security risks, data protection failures, cloud outages, vendor lock-in, data loss, vendor failure and contract failure. A brief illustration of the process is outlined below.

Business review

Perhaps the case for Cloud Computing emanates from one separate business function or division? As long as it is one separate project it will be manageable and you can draw a lot of conclusions from the process. The problems arise when dozens of initiatives pops up from all over. This can lead to unwanted consequences. Formulating a cloud strategy and doing a concerted effort is the preferred way of going forward.

The key tips to get you started:

  • Review the key drivers, objectives and the positive/negative impact criteria that those business functions/divisions have decided upon.
  • Map them to your overall business and you IT Capabilities.
  • Engage those volunteers that are in the frontline as change leaders.
  • Identify employees from all parts of your business to be change evaluators.

Now you have a high-level map, a risk matrix and a team of eager souls betting on a change. Congrats! You have successfully completed the first stage.

Next article will present some musings on the roles within the team and a schizophrenic change leader that you will depend upon.

By Predrag Mitrovic

Predrag is also the Chief Inspiration Officer and Owner of MyNethouse.se.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…