TMNG Global Introduces New Cloud Value Model

TMNG Global Introduces New Cloud Value Model

Hidden cloud migration costs are still a concern for smart corporate executives

TMNG Global introduced a new proprietary financial model called the Cloud Value Model(SM) that allows corporations and executives to measure actual costs and benefits originating from migration to the Cloud. The product is able to provide thorough analysis on potential cost savings before, during, and after migration to the Cloud, allowing corporate executives to work out more precise strategic plans and adopt cloud-based solutions based on carefully estimated return on investment, according to Rich Nespola, TMNG Global’s Chairman and CEO.

For many companies, the inability to accurately determine costs is a significant barrier to Cloud adoption. This is particularly true as it pertains to the comparison of legacy IT costs to the costs of new Cloud services,” Nespola said in a press release. “Our Cloud Value Model(SM)performs a comprehensive five-year end-to-end lifecycle analysis of IT operations, systems and applications, thereby quantifying both the hard and soft costs and benefits of moving to the Cloud for our clients,” he added.

The Overland Park, Kansas-based company has developed a product, enabling enterprise customers to measure all expected benefits from cloud migration in real financial terms, based on assessment of current overall IT costs that are gauged against those costs during migration to the Cloud and afterwards.

Corporate executives would be glad to use such a tool in taking decisions on cloud solutions adoption after a growing number of managers realize there are hidden costs of deployment of cloud-based solutions that are able to hamper overall positive effect of cloud solutions adoption. When migrating to the public cloud, a company should be ready to face significant costs related to tweaking existing applications to be able to run flawlessly in the Cloud. Actually, most relatively older but widespread business applications are not completely cloud-ready, requiring significant investment in additional software development if a company wants to move existing business applications to the Cloud.

Another aspect of the same problem is related to integration between traditional on-premise systems and cloud-based solutions that often requires specific interface and protocols to achieve full compatibility. Thus, an enterprise would be forced to invest heavily in integration software to take utmost advantage of cloud-based systems that usually utilize latest protocol versions and rely on most recent technology. In fact, this scenario brings benefits in the long run for companies are forced to shift to the most modern solutions available but can be burdening from a budgetary point of view.

If a company is adopting an exit plan scenario that envisages return of backed up data and services back on-premises in case of cloud provider failure to deliver, those additional costs are to be planned in advance and included in the overall assessment of cloud adoption costs. A clever approach to cloud migration, however, requires never relying on a sole solution and be prepared for emergencies that occur in the cloud. Taken as a whole, the Cloud is more secure in terms of protection against power failures and subsequent loss of data and provides reliable backup options. Nonetheless, recent inability of cloud giant Google to restore diminished content of numerous users of its Gmail web email service shows that even leading cloud providers can experience serious troubles restoring data and information regardless of what actually triggered the problem.

A company might incur further hidden expenditures if its managers are not aware that the process of migrating large volumes of corporate data to the Cloud is similar, in theory, to using Appple’s iCloud web service to store music online but can be very costly in practice due to specifics of price determination in the Cloud. Imagine a scenario where a cloud provider charges only 1 cent per GB uploaded to its remote storage servers but the cost of download is set at 10 cents per GB. A simple calculation shows that if your day-to-day business process requires the download of vast data volumes from a remote server it would not be very advantageous to use such service. We are yet to see whether the Cloud Value Model(SM) is able to evaluate such expenses in a usable and proper manner but executives should be aware that many of the obvious advantages of cloud-based solutions could be wiped out if adopted without proper and thorough costs analysis.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

Cloud Infographic – Big Data Predictions By 2023

Cloud Infographic – Big Data Predictions By 2023

Big Data Predictions By 2023 Everything we do online from social networking to e-commerce purchases, chatting, and even simple browsing yields tons of data that certain organizations collect and poll together with other partner organizations. The results are massive volumes of data, hence the name “Big Data”. This includes personal and behavioral profiles that are stored, managed, and…