Cloud Computing Feasibility- What Should ISVs Look For?

Cloud Computing Feasibility- What Should ISVs Look For?

Cloud feasibility- what should ISVs look for?

There is a myriad of consulting options available to ISVs when considering cloud adoption. On one hand, there are short consulting engagements adopted as a “foot in the door” strategy to win cloud migration projects. On the other, there are very detailed engagements which can lead to analysis paralysis, only to arrive at the conclusion that the cloud is not an option. Since the decision to switch over to the cloud can leave anyone’s mind spinning, here are a few solutions to help an ISV while engaging with a consulting service provider.

360° Assessment: There are obviously business drivers for adopting the cloud, but with those also come technology considerations and associated risks. All three of these factors must be assessed equally, like a three legged stool, remove a leg and we know what happens.

Business: The first point to assess is the business drivers behind considering cloud adoption, like capturing new markets at lower price points. This new market and associated profits can remain untapped unless an ISV moves onto cloud in a Software-as-a-service model. If a competitor has changed the game by introducing a Saas on Cloud model for the existing market, there is a risk of losing market share unless the ISV steps up and emulates the competitor. On the other hand, there may not be an immediate competition that requires the ISV to adopt the cloud, but offering the software as a service could help in lowering engineering IT costs by moving development & test environments to the cloud.

Risk: Cloud adoption comes with its own risks, namely change management. The switch to the cloud creates far reaching changes across an organization and its ecosystem. Channels which survive on license and services revenue suddenly shrink and customer service gains importance as switching costs are low. Additionally, the engineering department will need to cope with considerably shorter release cycles. Professional services become an endangered species as customizations and long upgrades become near extinct. However, a well formulated and agreed upon plan to manage these changes should come before even considering the technological aspects of cloud conversion.

Security is also a risk to consider when dealing with cloud adoption. Once the conversion has begun, data starts moving across the firewalls in a multi tenant service where customers share the same database. While security is considered to be a design issue it is important to think about the mitigation strategies, both preventive and reactive, before considering cloud adoption. Issues can also develop pertaining to compliance, which are domain or region specific, like data location in a particular country. It is important to rectify these issues before any steps are made toward the cloud. If the solutions are weak, a hybrid model where the sensitive data resides on premise could be a suitable deployment model.

An ISV should move ahead only when there is a complete understanding of the changes the company will undergo. There are many more risks as well as mitigation strategies associated with cloud adoption. The key here is to assess the risks upfront and put the mitigation strategies in place before embarking on a migration project.

Technology: Technological concerns should come after the business and risk assessments. Look at the architecture carefully; a few of the right questions on the current architecture can shine a lot of light onto the best migration path. This is a good approach for the consulting organization to take before taking a deep dive into a long consulting engagement. Also, different infrastructure and application platforms have different and unique features, so a quick look at the compatibility can narrow down choices at an early stage in the consulting process.

Process Maturity:  This critical aspect is most often ignored in cloud adoption planning. This piece of the puzzle looks at the impact post migration has on development and QA processes. The ISV must figure out the best practices and optimized processes to cope with this impact. After deciding upon the most efficient process for data migration, they’ll need some assistance once on-board.

Some useful questions for ISVs during the consulting process include:

  • How can cloud integrations keep pace with various releases of the Saas product and third party on-premise applications?
  • Is usage-based billing critical, or will subscription based billings suffice?
  • How do we deal with the additional demands of application management? Is self provisioning a must?

All of these concerns must be thought out completely during feasibility assessment of cloud migration. It is important to always keep the ISV’s particular needs in mind and consider all impacts of cloud migration when making the switch.

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

By Milind Khirwadkar, AVP Cloud Services, Symphony Services

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Marketing Execs Beefing Up on Martech Strategies

Marketing Execs Beefing Up on Martech Strategies

Martech Strategies As budgets shift from traditional marketing streams to marketing technology, it’s essential that both marketers and business leaders understand marketing technology and keep up with the developments. According to eMarketer, 78% of US senior marketers surveyed believe gaining this understanding of marketing technology is increasingly relevant to their success, and the majority of…

4 Monetization Models For The Digital Business Era

4 Monetization Models For The Digital Business Era

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years. However, MGI Research predicts that digital businesses will need to increase their time to market by 40 percent. Many global executives admit they are unprepared to monetize their operations. The million dollar question is: how…

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

The cyberwar is on! At this stage of the game, the stakes are higher than ever, and safeguarding networks from cyberattacks is a devilish combination of Chicken and Cat-and-Mouse. Attacks are now so commonplace that many events of serious cybersecurity breaches go uncovered by mainstream media. Despite the rapid advancements in IT security technology, hackers…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

5 Reasons Why Your Startup Will Grow Faster In The Cloud

5 Reasons Why Your Startup Will Grow Faster In The Cloud

Cloud Startup Fast-tracking Start-ups face many challenges, the biggest of which is usually managing growth. A start-up that does not grow is at constant risk of failure, whereas a new business that grows faster than expected may be hindered by operational constraints, such as a lack of staff, workspace and networks. It is an unfortunate…

Cloud Infographic – The Data Scientist

Cloud Infographic – The Data Scientist

Data Scientist Report The amount of data in our world has been exploding in recent years. Managing big data has become an integral part of many businesses, generating billions of dollars of competitive innovations, productivity and job growth. Forecasting where the big data industry is going has become vital to corporate strategy. Enter the Data…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud Are Still Going Strong

SaaS And The Cloud With the results of Cisco Global Could Index: 2013-2018 and Hosting and Cloud Study 2014, predictions for the future of cloud computing are notable. Forbes reported that spending on infrastructure-related services has increased as public cloud computing uptake spreads, and reflected on Gartner’s Public Cloud Services Forecast. The public cloud service…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…