How To Find IT Specialists For The Cloud

How to find IT specialists for the cloud – CISCO implementation for ConnectEDU

As I said in an article some time ago, Cloud Computing Decreases Production Infrastructure Expenses by over 30% for Web Based Leader in Education Management, as a CTO, I had to find the best solution for implementing efficient and cost-effective production infrastructure. One of the challenges I had to face was migrating from all of my physical infrastructure to Navisite’s Managed Cloud Sevices for ConnectEDU.

In the Cloud Recruitment Perspectives I discussed the importance of professional assistance from specialized IT staffing companies for organizations searching to hire cloud IT specialist. Today I would like to talk about the process of hiring IT specialists based on my experience with the CISCO implementation for ConnectEDU.

First, we looked for migration specialists to map our 60+ servers into the cloud.  We analyzed the processing, memory and disk of each server and then estimated the size of the virtual (IaaS) servers that we would need. We were able to eliminate 15%+ of the servers just by adjusting what ran on each cloud server.

For example we found that we could combine some web services that did not require a tremendous amount of processing or used for overnight processing onto one large virtual server. This led to eliminating the number of servers required and also made things more efficient on the Cisco UCS Cloud Fabric.

When we could, we used physical to virtual conversions. There were several machines that could not be converted easily, like the massive data base servers. We estimated that it would take weeks to convert these massive data base servers so we rebuilt those physical to virtuals by hand and then transferred the data base from a restore point.

Once the system was running in parallel we were able to add additional virtualized load balanced servers for reliability.  It was very helpful working with a team of cloud computing experts that we contracted with during this phase. I also should mention that some of the existing IT staff was hesitant to help with this transition, because they felt like their jobs keeping physical servers running were going away. We worked with them on helping them train for new positions, but they still had a difficult time leaving the physical world. The support of the team was very important during this process. Believing in a better solution and working as a team had great benefits on achieving our goals.

The solution we implemented was a total success and we shared our success with other companies to help them migrate from proprietary application servers towards virtualization and cloud computing. The benefits are massive in terms of technology and employees’ activity. And if you have migrated or are looking for professional assistance please reach out to me, I would be interested in hearing about your successes or for those of you making the switch, I will share with you some of the things I have learned.

By Rick Blaisdell / RicksCloud

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to being a mission-critical component, BODs are also becoming more interested in what their organizations are doing to plan their incident…

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

Write Once, Run Anywhere: The IoT Machine Learning Shift From Proprietary Technology To Data

The IoT Machine Learning Shift While early artificial intelligence (AI) programs were a one-trick pony, typically only able to excel at one task, today it’s about becoming a jack of all trades. Or at least, that’s the intention. The goal is to write one program that can solve multi-variant problems without the need to be rewritten when conditions change—write once, run anywhere. Digital heavyweights—notably Amazon, Google, IBM, and Microsoft—are now open sourcing their machine learning…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past several years that have fallen victim to data breaches and lived to survive: Premera Blue Cross had 11 million member’s…

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management: Advancing to Meet the Changing Needs of Passwords and Governance

Identity and Access Management The identity and access management market continues to grow in a wide variety of industries of all sizes. As has been much discussed in many headlines, this is primarily because of three main reasons: 1) It is much more cost effective to implement than in past years; 2) Solutions can be implemented fairly quickly, and 3) Companies have realized the great benefits IAM solutions bring to their organization. As the IAM…

Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think he is. That person is going to work but rather than creating reports and spreadsheets, he’s part of a criminal…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around the goal of finding a cure for cancer. President Obama put his second-in-command, Vice President Joe Biden, in charge of…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand, but in an ever-changing technology landscape and with complex, inter-related business operations to manage, implementing GRC can seem like a…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of your control. But in order to effectively provide quality services with the focus on the customer, providers need to ensure…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business, while the technology and cybersecurity around it constantly evolves. This can lead businesses to finding themselves with a fragmented approach…