A Brave New Cloud Computing World: How do You Transition From Traditional IT to Cloud Computing?

There’s no question that the cloud is the future of IT. But making that transition isn’t always easy – especially if your company has been purchasing PCs, servers, and software for the past few decades.

I have already discussed some of the ways that cloud computing is influencing the IT industry. Of particular importance among the many changes in the IT industry, and the need for professionals to adapt, is that cloud providers are starting to massively affect the ways traditional hardware and software companies sell and get paid for their products.

In my company’s experience, the shift from owning our own hardware and software to migrating to a model based purely on Software as a Service meant we were left with lots of used hardware and software to sell. But there was also a much larger issue: What do we do with all of the internal IT resources that managed the hardware and software we just sold?

To me, this change is no different than the industry trend towards outsourced IT. The goal of the outsourced IT company is to reduce your internal IT expenses by leveraging a more efficient, scalable and cost-effective source that ultimately saves your company money. But as your company starts to shift towards SaaS-based services, their services decline, so in a way they are cannibalizing their own revenue model. That’s a lot like how internal IT employees might feel when helping their company shift to SaaS-based services.

I have had many discussions with outsourced IT companies, and some of them understand that their traditional business model of building and maintaining servers is shifting. To stay competitive, they now need to help companies reduce overall expenses by migrating to the cloud. In doing so, they are becoming more efficient, because now they can attract much larger companies as clients. Why? Simple: It’s much more efficient to manage SaaS-based and IaaS-based services, so fewer people are needed to manage larger accounts.

The smart internal IT people I talk to are thinking the same way: They are elevating themselves within the company, managing the migration to these cloud-based services with their leftover capacity, and demonstrating the additional value they can bring to their organization. In our organization, these were people that transitioned from maintaining our server room to managing SaaS-based services and creating additional value in building dashboards to our product offerings that help drive our business.

In these conditions, how do you position yourself to help a company transition to cloud computing?

Here are a few ideas:

  • Consult on the opportunity to move to the cloud versus in-house IT;
  • Consult in helping to figure out what is needed for the company to move to the cloud;
  • Consult on choosing the best cloud provider based on the company’s specific needs;
  • Assist integration with existing systems;
  • Help other company members adapt to the new technology;
  • Troubleshoot the remaining IT infrastructure that can’t yet be moved to the cloud;
  • Show the plan after the cloud transition is complete — and show where you bring in value once the company is operating more efficiently and saving money!

By Rick Blaisdell

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…