Cloudsourcing – easy and challenging

Nothing grows in a vacuum. IT has evolved over the decades and has gone through several paradigm shifts. Virtualization of computer resources and the quest for the most effective operations have never gone out of fashion. Outsourcing parts, or all, of the IT Capabilities has a long track record. Those who have experience with out-/multisourcing have a new landscape to explore when considering going into the clouds.

Before exploring the benefits and the challenges, it is a great idea to make up a check list:

  • What are my drivers & motives for cloudsourcing? Be clear about your priorities and make sure that your MOUs/LOIs/SLAs/OLAs reflect your ideals.
  • Agree upon test-, proof-of-concept and transition periods.
  • Explore and verify your vendors flexibility and willingness to listen and adapt to your specific needs.
  • Make sure you have clear exit options, without any barriers and attempts of lock-in. Make a data portability clause in the agreements, if possible.

If you need some advice on how to do this, read my previous posts: http://www.cloudtweaks.com/2010/10/cloudcoke-%E2%80%93-successful-strategic-safari-in-the-clouds/ and http://www.cloudtweaks.com/2010/10/cloud-safari-investigate-the-surroundings/
Now that you have the check list it is time to understand the challenges you are facing. But, first I want to start with the good news.

Easier tasks with cloud vs outsourcing

It´s always easier with a list, so I am immediately presenting one. These are the parts made easier with cloud vs outsourcing:

  • No personnel transfers and/or take over of ICT department.
  • No/minimal equipment transfers.
  • Most likely you will get less and less handling of licenses.
  • TTM & TTA are almost immediate.
  • Location independent & globally scalable.
  • Redundancy built in.
  • Instant prognosis of costs – scales up and down.

Challenges with cloud vs outsourcing

During my research and work with cloud computing I have come over some possible challenges. Many are based on the fact that we are entering virgin territories:

  • Risk management frameworks are not adapted to cloud computing. Security concerns are under- or overestimated.
  • Operational practices of the Cloud Service Provider vs your specific needs, wants and wishes: How does that translate into a multi-tenant massive data center?
  • Low, or none, physical control over the operations centers.
  • Regulatory compliance.
  • Audit possibilities.
  • Interfaces between systems in the cloud and those in-house/outsourced?
  • Change of vendor.

Outside-in view needed

The cloud hype have been vendor-driven so far. Now is the time for the customer to start putting the promises to the test. One first sanity check is to benchmark your first question in the above described check list against your vendor. If the result is a successful outcome for the customer (and the vendor), then we are on our way to something good.

Next article is going to address the ideal outside-in relationship building. I will wear my customer glasses when writing.

Article by Predrag Mitrovic of CloudTweaks

Predrag is also the Chief Inspiration Officer and Owner of MyNethouse.se and will be offering a number of cloud based workshops in 2011 .

FacebookTwitterLinkedInGoogle+Share

Sorry, comments are closed for this post.

Join Our Newsletter

Receive updates each week on news, tips, events, comics and much more...

Advertising Programs

Click To Find Out!

Sponsored Posts

Sponsored Posts

CloudTweaks has enjoyed a great relationship with many businesses, influencers and readers over the years, and it is one that we are interested in continuing. When we meet up with prospective clients, our intent is to establish a more solid relationship in which our clients invest in a campaign that consists of a number of

Popular

Top Viral Impact

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends

Technology Advice Report: 2014 Business Intelligence Buying Trends For nearly every business, the concept of business intelligence is nothing new. Ambitious organizations have been searching for any type of data-driven advantage for some time now – perhaps for as long as they’ve existed. However, the historical use of competitive intelligence pales in comparison to the

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation

Can I Contribute To CloudTweaks?

Yes, much of our focus in 2015 will be on working with other influencers in a collaborative manner. If you're a technology influencer looking to collaborate long term with CloudTweaks – a globally recognized leader in cloud computing information – drop us an email with “tech influencer” in the subject line.

Please review the guidelines before applying.

Whitepapers

Top Research Assets

HP OpenStack® Technology Breaking the Enterprise Barrier

HP OpenStack® Technology Breaking the Enterprise Barrier

Explore how cloud computing is a solution to the problems facing data centers today and highlights the cutting-edge technology (including OpenStack cloud computing) that HP is bringing to the current stage. If you are a CTO, data center administrator, systems architect, or an IT professional looking for an enterprise-grade, hybrid delivery cloud computing solution that’s open,

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security

Public Cloud Flexibility, Private Cloud Security Cloud applications are a priority for every business – the technology is flexible, easy-to-use, and offers compelling economic benefits to the enterprise. The challenge is that cloud applications increase the potential for corporate data to leak, raising compliance and security concerns for IT. A primary security concern facing organizations moving