Tips to Help Businesses Make the Most of the Cloud

Tips to Help Businesses Make the Most of the Cloud

Businesses looking to embrace the cloud sometimes try to find a solution that will allow them to make the transition from in-house services to the cloud as effortlessly as possible. Most of the successful examples that we witnessed in our practice, though, embrace the cloud as a driver of change, forcing the changes in the underlying IT processes and finding new sources of effectiveness and opportunity on the path of doing so. Acknowledging the necessity for change in order to get the most of the cloud is the first step that the organizations should make.

Identify business processes that can benefit from using the cloud.

For each business process, one should keep in mind the reason to use the cloud in the first place. Possible reasons for using the cloud include:

  • Cost: for the workloads where volume of processing varies significantly from month to month or even day by day, switching to pay-as-you-go model can provide significant cost savings over the TCO of an in-house infrastructure;
  • Business agility: most of the cloud offerings provide a great degree of automation, greatly improving turnaround time of IT-related processes
  • SLAs: even though cloud providers may provide weak SLAs in one area, it can be actually compensated by much more generous SLAs in others. For instance, time to provision virtual hardware on the cloud is usually orders of magnitude less than to provision physical hardware through in-house IT departments.

Break down the IT processes and applications that support your business processes identified in the previous steps into classes according to the benefits that you want to receive from transition to the cloud. Depending on what the goal is, the approach will also vary.

Analyze the following items to avoid potential road blocks.

  • Identify the data that is touched by each IT process. Is there any data that has to stay in-house for security or compliance reasons? You may need to change IT processes so the sensitive data is not affected by the transition.
  • Analyze data access patterns. Data-intensive applications are usually not the best fit for a cloud, unless you plan to put all of your data in the cloud.
  • Identify security domains. As with any external provider, one should always treat the cloud as a separate security domain. What is less obvious is that there are different security domains within cloud itself. Do you need to satisfy PCI DSS requirements? Can your cloud provider give you guarantees on the data boundaries?
  • Determine availability and reliability targets. Not all of the cloud providers provide strict SLAs on availability and even when they do, those can be misunderstood (as happened with the notorious Amazon outage earlier this year). However, applications that are more tolerant to weaker availability SLAs can be a good fit.

Calculate total cost.

For some applications, cloud can actually be more expensive than an in-house solution. Licensing models of the major cloud providers usually work well for smaller players, but can be prohibitively expensive when the business starts to scale.

With a fast-growing industry such as cloud services, the landscape is doomed to change every year. Our general recommendation for the businesses looking to embrace the cloud is to have a trusted partner. Whether it’s a consultancy, an SI or a VAR specializing on cloud services, having a party that can help businesses to define and implement multi-year roadmap is something that can immensely simplify transition to the cloud.

By Stan Klimoff, Director of Cloud Services for Grid Dynamics.

Grid Dynamics, the authority on cloud computing and enterprise systems scalability, helps companies achieve better performance, higher availability, faster time-to-market and lower operational costs by scaling mission-critical systems. Using the latest advancements in grid and cloud computing technologies, the company helps customers turn monolithic applications into scalable services; and static, underutilized server clusters into virtualized compute clouds. www.griddynamics.com

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Higher Education Institutions Increasing Cloud Use In Next 5 Years

Cloud Computing Advancing Edtech In a new research study by ResearchMoz it’s predicted that the global cloud computing market in higher education will grow steadily at a CAGR of 24.57% over the period 2016 to 2020. Making use of computing resources connected by either public or private networks provides the benefits of scalable infrastructure, greater…

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Big Data and AI Hold Greatest Promise For Healthcare Technologies

Digital Healthcare Executives and Investors Addressed Opportunities and Challenges Facing the Industry New York City – September 21, 2016 – According to a survey of 122 founders, executives and investors in health-tech companies released today by Silicon Valley Bank, big data and artificial intelligence will have the greatest impact on the industry in the year ahead. Healthcare…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…