How To Select The Right Cloud Service – One Size Doesn’t Fit All

How To Select The Right Cloud Service

This autumn and winter have been rich with opportunities to discuss cloud strategies with many different audiences; from CIO’s to CFO’s and LCA’s. I have experienced a big demand for clarifications on the question(s): What can I put in the cloud and what´s in it for me? I put together a recent blog post on cloudadvisor.se which I’d like to share with you. I will start with the “What” part…

IaaS-scenario

When you are considering Infrastructure as a Service there are some clear areas that are suitable:

  • Seasonal peaks in IT demand makes a perfect business case for IaaS. This is the easiest way to also understand the “What´s in it for me” part of the question.
  • Evaluation of software solutions can be demanding and consume a lot of HW resources. Every piece of SW have specific demands and the needs are clearly periodical. Since these kinds of test are of paramount importance for every organization, IaaS can be used to perform the testing with all capacity needs.
  • System testing is even more demanding in shorter periods of time, than SW evaluations. perfect IaaS candidate.

PaaS-scenario

This scenario holds many benefits that are crystal clear: From the full lifecycle platforms to specific technology enabling platforms. The full lifecycle platforms typically include (and integrate):

  • A workflow engine
  • A set of development tools
  • Testing environments for your application development projects
  • Possibility to integrate databases
  • A rich range of third party tools and/or services

In most cases the initial development part comes with no costs. So, clearly this is a very attractive possibility to have a full development environment with necessary underlying data center power. But, be cautious when planning to deploy your solution in the PaaS solution. You need to understand the total costs and the possibility to move your logic out of the PaaS solution (code/logic portability).

SaaS-scenario

There are two general “truths” on SaaS:

  • The more independent the SaaS is from your in-house applications, the easier to achieve fast effects.
  • Massively scalable applications are excellent candidates to move from your datacenter to the cloud (e-mail as the best example).

Now, to the second part: What´s in it for me?

TCO (Total Cost Of Ownership) today, tomorrow and in the future

To be able to make any kind of informed decision you first need to understand your TCO per application/workload that you currently have. You probably have an economic model in place, but if that isn´t the case, you need to understand the cost associated with each application/workload. In the model you need to map costs for server, storage, networking, communications, disaster recovery, datacenter costs, platform costs, packaging, provisioning, AAA processes, maintenance, help-desk, support, end user education, management and much more. By adding all costs per application/workload, you now have a pretty good TCO figure annually. Now, you need to do the math per application/workload that you see as a cloud candidate. The effects that you need to understand are sometimes clear and sometimes blurry.

Here are only three areas you need to consider, beside the financial model (and there are at least a dozen more):

  • Server utilization: A specific application that is easy to virtualize is probably more expensive to run in the cloud.
  • Plattform considerations: Have you entered SW Maintenance Agreements? Are those agreements per server, processor, user or a combination of other factors? Do you have some kind of transaction engine, message bus or middleware solution in place to support your applications platforms? How tied are those?
  • Storage costs: An application that is light on network based storage resources is probably harder to find an economic benefit for in the cloud.

Conclusions

I have provided some brief examples to show you that a cloud transition is a thought, planning and strategy process. When you embark on the process, you must understand that during some transitional phases, you will actually end up having a higher TCO. But, I guess that this is the sheer beauty of the clouds?

By Predrag

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…