How To Select The Right Cloud Service – One Size Doesn’t Fit All

How To Select The Right Cloud Service

This autumn and winter have been rich with opportunities to discuss cloud strategies with many different audiences; from CIO’s to CFO’s and LCA’s. I have experienced a big demand for clarifications on the question(s): What can I put in the cloud and what´s in it for me? I put together a recent blog post on cloudadvisor.se which I’d like to share with you. I will start with the “What” part…

IaaS-scenario

When you are considering Infrastructure as a Service there are some clear areas that are suitable:

  • Seasonal peaks in IT demand makes a perfect business case for IaaS. This is the easiest way to also understand the “What´s in it for me” part of the question.
  • Evaluation of software solutions can be demanding and consume a lot of HW resources. Every piece of SW have specific demands and the needs are clearly periodical. Since these kinds of test are of paramount importance for every organization, IaaS can be used to perform the testing with all capacity needs.
  • System testing is even more demanding in shorter periods of time, than SW evaluations. perfect IaaS candidate.

PaaS-scenario

This scenario holds many benefits that are crystal clear: From the full lifecycle platforms to specific technology enabling platforms. The full lifecycle platforms typically include (and integrate):

  • A workflow engine
  • A set of development tools
  • Testing environments for your application development projects
  • Possibility to integrate databases
  • A rich range of third party tools and/or services

In most cases the initial development part comes with no costs. So, clearly this is a very attractive possibility to have a full development environment with necessary underlying data center power. But, be cautious when planning to deploy your solution in the PaaS solution. You need to understand the total costs and the possibility to move your logic out of the PaaS solution (code/logic portability).

SaaS-scenario

There are two general “truths” on SaaS:

  • The more independent the SaaS is from your in-house applications, the easier to achieve fast effects.
  • Massively scalable applications are excellent candidates to move from your datacenter to the cloud (e-mail as the best example).

Now, to the second part: What´s in it for me?

TCO (Total Cost Of Ownership) today, tomorrow and in the future

To be able to make any kind of informed decision you first need to understand your TCO per application/workload that you currently have. You probably have an economic model in place, but if that isn´t the case, you need to understand the cost associated with each application/workload. In the model you need to map costs for server, storage, networking, communications, disaster recovery, datacenter costs, platform costs, packaging, provisioning, AAA processes, maintenance, help-desk, support, end user education, management and much more. By adding all costs per application/workload, you now have a pretty good TCO figure annually. Now, you need to do the math per application/workload that you see as a cloud candidate. The effects that you need to understand are sometimes clear and sometimes blurry.

Here are only three areas you need to consider, beside the financial model (and there are at least a dozen more):

  • Server utilization: A specific application that is easy to virtualize is probably more expensive to run in the cloud.
  • Plattform considerations: Have you entered SW Maintenance Agreements? Are those agreements per server, processor, user or a combination of other factors? Do you have some kind of transaction engine, message bus or middleware solution in place to support your applications platforms? How tied are those?
  • Storage costs: An application that is light on network based storage resources is probably harder to find an economic benefit for in the cloud.

Conclusions

I have provided some brief examples to show you that a cloud transition is a thought, planning and strategy process. When you embark on the process, you must understand that during some transitional phases, you will actually end up having a higher TCO. But, I guess that this is the sheer beauty of the clouds?

By Predrag

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data – Top Critical Technology Trend For The Next Five Years

Big Data Future Today’s organizations should become more collaborative, virtual, adaptive, and agile in order to be successful in complex business world. They should be able to respond to changes and market needs. Many organizations found that the valuable data they possess and how they use it can make them different than others. In fact,…

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Report: Enterprise Cloud Computing Moves Into Mature Growth Phase

Verizon Cloud Report Enterprises using the cloud, even for mission-critical projects, is no longer new or unusual. It’s now firmly established as a reliable workhorse for an organization and one that can deliver great value and drive transformation. That’s according to a new report from Verizon entitled “State of the Market: Enterprise Cloud 2016.” which…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

5 Surprising Ways Cloud Computing Is Changing Education

5 Surprising Ways Cloud Computing Is Changing Education

Cloud Computing Education The benefits of cloud computing are being recognized in businesses and institutions across the board, with almost 90 percent of organizations currently using some kind of cloud-based application. The immediate benefits of cloud computing are obvious: cloud-based applications reduce infrastructure and IT costs, increase accessibility, enable collaboration, and allow organizations more flexibility…