Cloud Management: An Important Consideration In The Road Map For An ISV

Cloud Management

Cloud management is more than just monitoring service in the cloud computing environment. It is the task of provisioning, metering, billing and monitoring service in a cloud computing environment and staying profitable.

The following key areas play an important role in operating cloud services:

  • Self-service Portal
  • Service Level Agreement
  • Policy Management
  • Metering and billing

Self-Service Portal

A key requirement for operating in a cloud environment is to enable the self-service aspect of cloud computing to allow service consumers the power to provision the appropriate services from an approved service catalog. The self-service portal must enable consumers to access billing details, SLAs, service consumption dashboards, and service provisioning.

Service Level Agreement

A cloud service may or may not have an associated SLA. A SLA uses an agreed upon language that forms a contract between the ISV and cloud service consumer that enables both parties to agree, to be understood, and to have a consistent approach in the definition and reporting of the quality of a cloud solution. ISV designed SLAs must contain a number of attributes that have an established set of metrics that will be monitored and measured to make sure that the cloud service is meeting its contractual obligations.

Policy Management

Policy management is the demonstration of, and enforcement to, regulatory standards, industry standards, and internal best practices. To have your cloud services run effectively, it must adhere to these agreed upon standards and policies that promote efficient operating procedures.

Example policy categories include the following:

  • Security policies
  • Regulatory policies
  • Resource scheduling policies
  • Configuration policies
  • Quality of service (QoS) policies

ISVs need to ensure that there is a monitoring system in place to effectively manage and monitor the various policies.

Metering and Billing

It is very critical to have a comprehensive monitoring and metering system to support provisioning, control costs, meet SLA obligations, and define chargeback schemes. Metering is a very valuable endeavor in demonstrating resource consumption.  ISVs need to offer an automated billing capabilities to support the new cloud service pricing models, whether that is via flat-rate or usage-based billing. However, this can be challenging due to the cloud infrastructure’s dynamic nature and the complexity to track usage based on resource consumption by each cloud consumer. It is also very critical to provide an easy-to-navigate billing dashboard, and a billing API so that the billing metrics can be integrated with existing reporting and analysis systems. If consumers can see their usage in real time, they can make analytical decisions about controlling their consumption accordingly.

Service players need to extend their offering to include Cloud management in order to provide ISVs the true value and potential from Cloud technology.  Differentiation of service vendors will be made not only on whether they can host products in the cloud or can do SaaSification of product, but can they extend their cloud services to Cloud Management as well.

By Ananta Shamal, Director of Cloud Services, Symphony Services

Symphony Services is a leading global specialist providing software product engineering outsourcing services. The company’s focus on Engineering Outcome Certainty™ drives R&D results that shorten time-to-market for new products and delivers greater innovation to compete in a global marketplace. Independent software vendors (ISVs), software enabled businesses and companies whose products contain embedded software partner with Symphony Services to achieve their business goals.

 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…