Cloud Data Migration: What An ISV Needs To Know

Cloud Data Migration: What an ISV Needs to Know

Cloud Data migration is not new to ISVs. Data conversion from legacy systems during new implementations is common and so is the data migration during major upgrades. ISVs adopt either manual methods or proprietary tools or resort to sophisticated ETL tools for this important step of a customer implementation project. However things change drastically when a customer is moving to cloud and the on premise data needs to be moved to the cloud. ISVs need to know and prepare for the following in their data migration solutions for their customers moving from on premise to cloud.

Storage selection: This happens actually much before the data migration and needs to be considered while designing the cloud architecture of their products. Cloud vendors offer multiple storage options. For example take S3, Simple DB and RDS offered by Amazon. While RDS is good for web apps, S3 is suitable for large media files and Simple DB is the best option for query-able light weight attribute data. Selecting the right storage simplifies data migration later during customer on boarding.

Data location:  On premise data migrations allow you to specify the target storage and path. However, in the case of the cloud, unless you ask for it you have no control over where your data will reside.  Hence while selecting a cloud vendor it is important to check whether they allow and facilitate this choice. Customers might have compliance reasons to insist on data location within a region and not having a strategy in place could mean loss of business.



Data selection:  It is critical to plan for the data to be migrated.  There could be multiple reasons for keeping part of the data on premise. These could be data sensitivity, archived data or a hybrid cloud model. What are really important are the data extraction strategy and the tools which can apply the filters e.g. attribute based, selection table based or aggregation function in SQL to extract the appropriate data.

Multi tenant data transformation:  Degree of multi tenancy plays an important role in data migration strategy. If it is separate database tenancy migration, it’s simple. If it is shared database but separate schema most of the ETL tools support it. But the challenge comes when it is a shared schema model tenant id which has to be passed at the record level. Run of the mill ETL tools will not support this and the ISV needs to prepare a solution well in advance before moving to shared schema multi tenancy.

Data loading strategies: There are multiple options like direct loading, Simple APIs or workflow based APIs.  Simple APIs check for data model failures or non compliance but in a multi tenant cloud there could be tenant specific data model extensions and APIs need to work with these. Similarly workflow based APIs run pre determined workflows and throw up pre defined errors in case of deviations. One needs to develop these APIs before hand as a part of the migration strategy.

Migration verification:  The standard method of on premise migration verification is to verify whether all attributes of selected objects are migrated. This poses challenges in cloud. Unlike on premise relational targets cloud storage do not yet support strong SQL querying capabilities. So the standard top down, bottom up equivalence or bottom-up fingerprint techniques do not work as is. And thus for verification, custom solutions need to be built before hand. While this post does not cover specific solutions, ISVs would benefit to use these as a checklist in their cloud migration strategy.

By Milind Khirwadkar, AVP Cloud Services, Symphony Services

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…