Cloudsourcing – easy and challenging

Cloudsourcing

Nothing grows in a vacuum. IT has evolved over the decades and has gone through several paradigm shifts. Virtualization of computer resources and the quest for the most effective operations have never gone out of fashion. Outsourcing parts, or all, of the IT Capabilities has a long track record. Those who have experience with out-/multisourcing have a new landscape to explore when considering going into the clouds.

Before exploring the benefits and the challenges, it is a great idea to make up a check list:

  • What are my drivers & motives for cloudsourcing? Be clear about your priorities and make sure that your MOUs/LOIs/SLAs/OLAs reflect your ideals.
  • Agree upon test-, proof-of-concept and transition periods.
  • Explore and verify your vendors flexibility and willingness to listen and adapt to your specific needs.
  • Make sure you have clear exit options, without any barriers and attempts of lock-in. Make a data portability clause in the agreements, if possible.

Now that you have the check list it is time to understand the challenges you are facing. But, first I want to start with the good news.

Easier tasks with cloud vs outsourcing

It´s always easier with a list, so I am immediately presenting one. These are the parts made easier with cloud vs outsourcing:

  • No personnel transfers and/or take over of ICT department.
  • No/minimal equipment transfers.
  • Most likely you will get less and less handling of licenses.
  • TTM & TTA are almost immediate.
  • Location independent & globally scalable.
  • Redundancy built in.
  • Instant prognosis of costs – scales up and down.

Challenges with cloud vs outsourcing

During my research and work with cloud computing I have come over some possible challenges. Many are based on the fact that we are entering virgin territories:

  • Risk management frameworks are not adapted to cloud computing. Security concerns are under- or overestimated.
  • Operational practices of the Cloud Service Provider vs your specific needs, wants and wishes: How does that translate into a multi-tenant massive data center?
  • Low, or none, physical control over the operations centers.
  • Regulatory compliance.
  • Audit possibilities.
  • Interfaces between systems in the cloud and those in-house/outsourced?
  • Change of vendor.

Outside-in view needed

The cloud hype have been vendor-driven so far. Now is the time for the customer to start putting the promises to the test. One first sanity check is to benchmark your first question in the above described check list against your vendor. If the result is a successful outcome for the customer (and the vendor), then we are on our way to something good.

Next article is going to address the ideal outside-in relationship building. I will wear my customer glasses when writing.

By Predrag Mitrovic

Predrag is also the Chief Inspiration Officer and Owner of MyNethouse.se and will be offering a number of cloud based workshops in 2011 .

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…