The Journey to the New IT: Four Key Observations

The Journey to the New IT: Four Key Observations

I do not think anyone who is currently working in IT right now would disagree with me that a transformation is in progress.  There would probably be a heated discussion on what that transformation is, or where it is headed, as this transformation can mean different things to different companies. Let’s talk about what GreenPages is seeing with our clients and how this can help you make sure this transformation works in your users’ favor.

Here are four main changes I have noticed:

1.  Users are now the focus, not applications or locations

It is all about the user.  Years ago, IT was all about making sure the applications were up and running.  IT spent a lot of time saying NO and had much more control of what was on the network and the tools that were available to their users.  The advent of smart mobile devices such as Androids, iPhones and especially iPads has created new abilities for the user to get access to the data and applications they need anywhere, anytime instead of having to be in the office to work. Now the work IT is doing is providing this access to the users while keeping the data safe and available.  Our clients are using VMware, Citrix, Cisco and many other technologies to provide this, and there are new options and capabilities monthly.

The days when users had to be in the office to work are long gone, and I am happy about that and am much more productive because of it.

 2. Virtualization is now a commodity

Virtualization is becoming much like a high school diploma in the sense that it is now an entry level requirement.  The values of using all of the memory, CPU and network resources you already have in a much more efficient way are undeniable.  Now the next tasks are making better use of the physical resources by using optimization tools such as CA, VKernel and vCenter Operations Suites.  These tools will let you assign the correct amount of resources to run the workloads without any waste or overprovisioning.  This is a tremendous savings and allows our clients who are using them to forecast when hardware or software resources will run out so they can plan their purchases instead of hitting the wall and having to get something quickly.

The other side of this is doing a better job managing what you have.  No admin I talk to has the time to proactively look at all of the virtual machines, physical hosts, network resources or metrics to find problems before they impact workloads.  That is where tools such as vCenter Operations, vFoglight, CA and Veeam come in.  They look at all of the resources, metrics, systems, and virtual machines and can point out areas of concern so you can focus identifying the issue and resolving it much quicker.

 3.   Cloud is here

The most overused term in the industry is Cloud.  However, that does not mean that it isn’t a game changing technology.  The cloud is changing and many of our clients are jumping on board in both small and large ways. Office 365, hosted servers and desktops, IAAS, and PAAS are the usual first steps.  Say what you will about the cloud, more and more applications and workloads are running in the cloud and more are joining them all the time.

4.  Better technology, better ways of solving issues

Everything from Intel and AMD processors, flash technology, SSD, new servers, converged infrastructure, improvement in VDI brokers and better and more efficient software keeps giving IT professionals better ways of solving the issues around keeping users happy.

The new IT is anywhere, anytime access to the applications and data needed to perform our jobs, entertain us and keep us connected. This is a journey and not a destination and I cannot wait to see what is coming next and how we can leverage it to make our lives, and our users’ lives, better.

By Chris Chesley

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…