Enterprise Cloud Computing and The Services Led Organization

Enterprise Cloud Computing and The Services Led Organization

Charge! That’s the rallying cry not of your IT on the way to the Cloud, but your business units as they use their corporate American Express (AMEX) cards to buy Cloud services.

The Cloud, like the Internet before it, it seems deceptively easy.

Back then, it was just connect. Done. Today, it’s just subscribe. Done.

The illusion is powerful and seductive, isn’t it?

As a C-level executive, you know better though. Being the CEO, CIO, or other senior executive responsible for running a global business with more than 10,000+ employees is no easy task. Perhaps you’re a Fortune 500 company or large government entity. Years of battle scars have turned you into a seasoned veteran. You know that thinking of Cloud computing as just another technology that can be incorporated the same way (you’ve added technology to your enterprise for the past 20 years) would be a mistake. You also know that Cloud computing isn’t about technology, it’s about business. So you’ve given serious thought to what it will take to migrate your slow, inefficient, static, traditional IT organization; change your business processes, and adapt your procurement to accommodate the acquisition of internal and external Cloud services. You’ve considered these and many other issues because you believe in the business agility, dynamic capabilities, and other benefits that a hybrid Cloud will bring to bear for your organization.

Yes, a hybrid Cloud. Lets be pragmatic about this. An enterprise of your scale (or larger) will likely have its own Private Cloud in addition to offloading some services to Public Cloud Service Providers. So you have carefully weighed the enterprise components you’ll need to keep in-house, and components you’ll defer to cloud service providers. You know you will need to manage this migration carefully or spend a lot of time and money cleaning up the mess.

However, you can’t sit still and wait. Rogue IT will create an unmanageable hodgepodge of point solutions throughout your enterprise if you do. Imagine all your business units independently negotiating agreements with the same or numerous Cloud Service Provider(s). The Gang of Six. No, not the ones in Washington, but

  1. Amazon (AMZN),
  2. Google (GOOG),
  3. Salesforce (CRM),
  4. VMWare (VMW),
  5. Microsoft (MSFT), and
  6. Apple (AAPL) whose devices (smartphones, tables), technology, and as-a-Service solutions (SaaS, PaaS, and IaaS) is overwhelming your enterprise.

Now it’ll be up to you to clean house and consolidate all those agreements attempting to leverage economies of scale and develop some IT governance and management around all those point solutions with varying Service Level Agreements (SLAs), if there are any at all. Like spaghetti programming, avoid it up front and you won’t have to redo the work down the road.

It’s a good thing you’re way ahead of the curve. You’ve been here before, not like some of the kids that grew up during the dot-com boom and continue to ask me how one “monetizes” the Cloud. This is real business, not “eyeballs” and other fanciful metrics.

You know it’s about your people, process, technology, and organization thereof. We can all have the same Rubik’s cube (technology), however, not everyone can organize it successfully to solve the (Cloud management) puzzle.  The right strategy is multifaceted, encompassing:

  • Migration (to a services model and new architecture),
  • Management and Governance (within and outside enterprise boundaries),
  • Organizational culture (silos and the status quo must be replaced by teamwork and cooperation),
  • Integration, Security, and Interoperability
  • Business and operational models,
  • Reference frameworks (for development), (business) models, and architectures (enterprise, technology, information, software, and systems),

And other key components to shift from a traditional, static, infrastructure management approach to dynamic, on demand, service management, and ultimately become an internal Cloud Service Provider, Cloud Broker, or both, to the rest of your organization. You think about this as you look down rows of Intel (INTC) x86 systems sprawled on valuable real-estate in your datacenter. At 10-15% utilization per system, that’s a highly inefficient energy, maintenance, and real estate footprint and that’s just the hardware – software maintenance, upgrades, patches, security, management, license fees, labor, the list seems endless. With 75-80% of your budget going to keep the lights on, and business units demanding services, you’re at risk of losing control of your IT.

So you’ve launched business transformation initiatives, understood that Cloud terms mean different things to different people in your enterprise and developed a common taxonomy to keep everyone on the same page. You have enumerated the benefits sought from migration to Cloud services, captured business requirements across business units, considered alternatives, studied the impact on your business processes, evaluated reference frameworks, models, and architectures, positioned your Services (or Web) Oriented Architecture (SOA/WOA) to take advantage of Web Services, worked on your IT governance, dispatched your leadership team to work on changing your organizational culture to break down silos, standardized your backend enterprise technologies and processes, simplified your IT environment, consolidated IT systems, servers, storage, networks, and rationalized your application portfolio – after all, does your enterprise really need to migrate 20,000 applications to the Cloud? Let’s hope not.

Finally, you have virtualized and abstracted your infrastructure. You can see the light at the end of the tunnel. Dynamic, elastic services are finally within your grasp. Now you’re deploying enterprise wide service offerings ranging from internally provided Cloud services to externally procured Cloud services brokered by your team.  Your business and IT services are a web of tightly integrated, loosely coupled, highly modularized and cohesive, end to end value chain with no weak links. Your team has shifted to business service operations, agile (iterative) implementation methods, highly flexible configuration management for automation and dynamic service delivery, orchestrated services, continuous (operations) improvement, and integration with development, to build, support, and maintain applications and services.

Is this your enterprise Cloud computing migration end game in order to become a (Cloud) Services Led Organization?

Regardless of your approach, you have to see your enterprise end game. Without a strategy, without a plan, without envisioning the end game, you’ll be changing direction midstream like many others before you. Don’t be seduced by the illusion. Develop your strategy and plan your rallying cry before committing your troops.

By Ray Depena

Tune The Future

Sorry, comments are closed for this post.

Comic
How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Significant Emerging Technologies To Lookout For In 2017

Significant Emerging Technologies To Lookout For In 2017

Emerging Technologies The entire world is being transformed right before our eyes. Emerging technologies are developing at break-neck speeds, and the global community needs to be prepared for what lies in the horizon. As with anything new or evolving there is benefit versus risk to consider. Most of the up-and-coming technologies that will soon affect…

In The Fast Lane: Connected Car Hacking A Big Risk

In The Fast Lane: Connected Car Hacking A Big Risk

Connected Car Hacking Researchers and cybersecurity experts working hard to keep hackers out of the driver’s seat. Modern transportation has come a million miles, and most all of today’s vehicles are controlled entirely by digital technology. Millions of drivers are not aware that of the many devices in their digital arsenal, the most complex of…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Building a Data Security Strategy – More Important Than Ever

Building a Data Security Strategy – More Important Than Ever

Data Security Strategy Article sponsored by SAS Software and Big Data Forum Security and privacy have been an integral concern of the IT industry since its very inception, but as it expands through web-based, mobile, and cloud-based applications, access to data is magnified as are the threats of illicit penetration. As enterprises manage vast quantities…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter

Using Big Data To Make Cities Smarter The city of the future is impeccably documented. Sensors are used to measure air quality, traffic patterns, and crowd movement. Emerging neighborhoods are quickly recognized, public safety threats are found via social networks, and emergencies are dealt with quicklier. Crowdsourcing reduces commuting times, provides people with better transportation…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…