An Enterprise’s Move To The Cloud – An Architectural Perspective

An Enterprise’s Move To The Cloud – An Architectural Perspective

An Enterprise’s Move To The Cloud

The cloud is not just some virtual server in the sky where one can just pick up an application and throw it in, consequently getting all the benefits associated with the app. The dare in this situation is that an enterprise has to re-architect its existing applications to fit the cloud in a way that maximum value can be mined from it. Placing a cloud into a broader context of an enterprise’s IT environment is the biggest issue, which is almost always overlooked.

Business objectives, which point to missions and goals of an organization, drive the technology strategy of an organization. So the strategy is based on the solution of an equation which comprises of the prevailing enterprise architecture, the stand point allied with the resources stacked up by an organization, and the way an organization moves forward. Helplessly, a cloud now has to fit into this story, as opposed to the general notion that a cloud solves everything by itself.

Three key areas have to tweaked and optimized by an enterprise from an architectural point of view.

  • Application modernization, being the first one, signifies taking something old and putting it through an evolution cycle to adapt to the up-to-date environment. As necessary as it may be, application modernization may sometimes not be the best option to consider, and hence, the second option of application rationalization comes into the limelight.
  • Application rationalization focuses on the concept of how a company extends its legacy capabilities, and leverages cloud based aptitudes, in order to extend existing assets the enterprise is not willing to retire, for commercial reasons.
  • Leveraging cloud based services is the third way of incorporating the cloud into the enterprise’s architectural strategy; whether they are SaaS, PaaS or IaaS, a business can extend its competences by using the cloud services.

Keeping these things in mind, the enterprise architect has to put together a cloud computing roadmap. The first thing is that the architect needs to decide the amount of risk that the organization is willing to take. After this, the specific goals of the business have to be found out; are they financial goals, operational goals or competitive goals. Moving on, the architect has to quantify the paybacks and see how much the enterprise is saving or how much value is added to the company, in the long and short run. Only then is an organization able to put together a tactical plan which will make it achieve what it plans to achieve.

By John Evans

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Through the Looking Glass: 2017 Tech and Security Industry Predictions

Through the Looking Glass: 2017 Tech and Security Industry Predictions

2017 Tech and Security Industry Predictions As we close out 2016, which didn’t start off very well for tech IPOs, momentum and performance has increased in the second half, and I believe that will continue well into 2017. M&A activity will also increase as many of the incumbents will realize that they need to inject new DNA into their stagnant cultures and flat to declining revenue numbers. Cyber Security Market Expands My first prediction, which…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that 64 percent of medium and large businesses believe cloud infrastructure is more secure than legacy systems. What factors contribute to…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that companies should first identify and classify data before deploying DLP. Unfortunately, we are just now seeing companies execute this approach.…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for years to follow. The role of Chief Marketing Officer (CMO) has evolved significantly in the past several years. Previously, the…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly darken your cloud. And as far as performance is concerned, it’s simply not ideal to be hosting large files such…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to these attacks with calls for tighter control and regulations, from the Society for Worldwide Interbank Financial Telecommunication (SWIFT) beefing up…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services or healthcare providers have stringent compliance requirements. As a key stakeholder, your recommendation or decision impacts the degree of adoption…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon take me away. The concept was simple, a mother or father frustrated with their day (and their children) whisked away…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported that 87 percent of respondents had faced a disruptive incident with third parties in the last two to three years.…