An Enterprise’s Move To The Cloud – An Architectural Perspective

An Enterprise’s Move To The Cloud – An Architectural Perspective

An Enterprise’s Move To The Cloud

The cloud is not just some virtual server in the sky where one can just pick up an application and throw it in, consequently getting all the benefits associated with the app. The dare in this situation is that an enterprise has to re-architect its existing applications to fit the cloud in a way that maximum value can be mined from it. Placing a cloud into a broader context of an enterprise’s IT environment is the biggest issue, which is almost always overlooked.

Business objectives, which point to missions and goals of an organization, drive the technology strategy of an organization. So the strategy is based on the solution of an equation which comprises of the prevailing enterprise architecture, the stand point allied with the resources stacked up by an organization, and the way an organization moves forward. Helplessly, a cloud now has to fit into this story, as opposed to the general notion that a cloud solves everything by itself.

Three key areas have to tweaked and optimized by an enterprise from an architectural point of view.

  • Application modernization, being the first one, signifies taking something old and putting it through an evolution cycle to adapt to the up-to-date environment. As necessary as it may be, application modernization may sometimes not be the best option to consider, and hence, the second option of application rationalization comes into the limelight.
  • Application rationalization focuses on the concept of how a company extends its legacy capabilities, and leverages cloud based aptitudes, in order to extend existing assets the enterprise is not willing to retire, for commercial reasons.
  • Leveraging cloud based services is the third way of incorporating the cloud into the enterprise’s architectural strategy; whether they are SaaS, PaaS or IaaS, a business can extend its competences by using the cloud services.

Keeping these things in mind, the enterprise architect has to put together a cloud computing roadmap. The first thing is that the architect needs to decide the amount of risk that the organization is willing to take. After this, the specific goals of the business have to be found out; are they financial goals, operational goals or competitive goals. Moving on, the architect has to quantify the paybacks and see how much the enterprise is saving or how much value is added to the company, in the long and short run. Only then is an organization able to put together a tactical plan which will make it achieve what it plans to achieve.

By John Evans

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS) And BYOD Security

Cyber Physical Systems (CPS)  Technology has changed the world radically. But, to date, the world hasn’t changed as fast as technology to. There are a couple of concepts that are concerning as we head into the reality of CPS-deployed systems. The first is that standards don’t exist. Many companies are considering the Bring Your Own…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Methodically Plan Your Cloud Design First

Methodically Plan Your Cloud Design First

Are You Sure You Are Ready For The Cloud: Design For the last few months, we have been discussing getting ready to go to the cloud. We have covered topics such as Financial and Business Security reasons. We have even discussed the type of knowledge you should obtain. This month, we are going to take…

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

Insider Threats and Sensitive Data in the Cloud

Insider Threats and Sensitive Data in the Cloud

The Age of Sensitive Data in the Cloud A recent survey report conducted by the Cloud Security Alliance (CSA) revealed that cloud security had reached a tipping point: 64.9% of respondents (which included IT security professionals from enterprises across all industries and regions) believed that the cloud was as secure or more secure than their…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor