Enterprise Cloud Computing and The Services Led Organization

Enterprise Cloud Computing and The Services Led Organization

Charge! That’s the rallying cry not of your IT on the way to the Cloud, but your business units as they use their corporate American Express (AMEX) cards to buy Cloud services.

The Cloud, like the Internet before it, it seems deceptively easy.

Back then, it was just connect. Done. Today, it’s just subscribe. Done.

The illusion is powerful and seductive, isn’t it?

As a C-level executive, you know better though. Being the CEO, CIO, or other senior executive responsible for running a global business with more than 10,000+ employees is no easy task. Perhaps you’re a Fortune 500 company or large government entity. Years of battle scars have turned you into a seasoned veteran. You know that thinking of Cloud computing as just another technology that can be incorporated the same way (you’ve added technology to your enterprise for the past 20 years) would be a mistake. You also know that Cloud computing isn’t about technology, it’s about business. So you’ve given serious thought to what it will take to migrate your slow, inefficient, static, traditional IT organization; change your business processes, and adapt your procurement to accommodate the acquisition of internal and external Cloud services. You’ve considered these and many other issues because you believe in the business agility, dynamic capabilities, and other benefits that a hybrid Cloud will bring to bear for your organization.

Yes, a hybrid Cloud. Lets be pragmatic about this. An enterprise of your scale (or larger) will likely have its own Private Cloud in addition to offloading some services to Public Cloud Service Providers. So you have carefully weighed the enterprise components you’ll need to keep in-house, and components you’ll defer to cloud service providers. You know you will need to manage this migration carefully or spend a lot of time and money cleaning up the mess.

However, you can’t sit still and wait. Rogue IT will create an unmanageable hodgepodge of point solutions throughout your enterprise if you do. Imagine all your business units independently negotiating agreements with the same or numerous Cloud Service Provider(s). The Gang of Six. No, not the ones in Washington, but

  1. Amazon (AMZN),
  2. Google (GOOG),
  3. Salesforce (CRM),
  4. VMWare (VMW),
  5. Microsoft (MSFT), and
  6. Apple (AAPL) whose devices (smartphones, tables), technology, and as-a-Service solutions (SaaS, PaaS, and IaaS) is overwhelming your enterprise.

Now it’ll be up to you to clean house and consolidate all those agreements attempting to leverage economies of scale and develop some IT governance and management around all those point solutions with varying Service Level Agreements (SLAs), if there are any at all. Like spaghetti programming, avoid it up front and you won’t have to redo the work down the road.

It’s a good thing you’re way ahead of the curve. You’ve been here before, not like some of the kids that grew up during the dot-com boom and continue to ask me how one “monetizes” the Cloud. This is real business, not “eyeballs” and other fanciful metrics.

You know it’s about your people, process, technology, and organization thereof. We can all have the same Rubik’s cube (technology), however, not everyone can organize it successfully to solve the (Cloud management) puzzle.  The right strategy is multifaceted, encompassing:

  • Migration (to a services model and new architecture),
  • Management and Governance (within and outside enterprise boundaries),
  • Organizational culture (silos and the status quo must be replaced by teamwork and cooperation),
  • Integration, Security, and Interoperability
  • Business and operational models,
  • Reference frameworks (for development), (business) models, and architectures (enterprise, technology, information, software, and systems),

And other key components to shift from a traditional, static, infrastructure management approach to dynamic, on demand, service management, and ultimately become an internal Cloud Service Provider, Cloud Broker, or both, to the rest of your organization. You think about this as you look down rows of Intel (INTC) x86 systems sprawled on valuable real-estate in your datacenter. At 10-15% utilization per system, that’s a highly inefficient energy, maintenance, and real estate footprint and that’s just the hardware – software maintenance, upgrades, patches, security, management, license fees, labor, the list seems endless. With 75-80% of your budget going to keep the lights on, and business units demanding services, you’re at risk of losing control of your IT.

So you’ve launched business transformation initiatives, understood that Cloud terms mean different things to different people in your enterprise and developed a common taxonomy to keep everyone on the same page. You have enumerated the benefits sought from migration to Cloud services, captured business requirements across business units, considered alternatives, studied the impact on your business processes, evaluated reference frameworks, models, and architectures, positioned your Services (or Web) Oriented Architecture (SOA/WOA) to take advantage of Web Services, worked on your IT governance, dispatched your leadership team to work on changing your organizational culture to break down silos, standardized your backend enterprise technologies and processes, simplified your IT environment, consolidated IT systems, servers, storage, networks, and rationalized your application portfolio – after all, does your enterprise really need to migrate 20,000 applications to the Cloud? Let’s hope not.

Finally, you have virtualized and abstracted your infrastructure. You can see the light at the end of the tunnel. Dynamic, elastic services are finally within your grasp. Now you’re deploying enterprise wide service offerings ranging from internally provided Cloud services to externally procured Cloud services brokered by your team.  Your business and IT services are a web of tightly integrated, loosely coupled, highly modularized and cohesive, end to end value chain with no weak links. Your team has shifted to business service operations, agile (iterative) implementation methods, highly flexible configuration management for automation and dynamic service delivery, orchestrated services, continuous (operations) improvement, and integration with development, to build, support, and maintain applications and services.

Is this your enterprise Cloud computing migration end game in order to become a (Cloud) Services Led Organization?

Regardless of your approach, you have to see your enterprise end game. Without a strategy, without a plan, without envisioning the end game, you’ll be changing direction midstream like many others before you. Don’t be seduced by the illusion. Develop your strategy and plan your rallying cry before committing your troops.

By Ray Depena

Tune The Future

Sorry, comments are closed for this post.

Comics
Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…