Putting The Service Back In “as-a-Service”

Putting the Service Back in “as-a-Service”

The future of cloud computing has often been framed as being a debate between private vs. public clouds, with each model having its own strengths and weaknesses in terms of cost-effectiveness, control and security. The debate should instead focus on what each model can borrow from the other to deliver the most efficient, scalable and flexible service possible.

When deploying a private cloud, system administrators should take a page from public clouds by focusing on the overall services their private cloud is providing. When designing and implementing a private cloud, enterprises need to focus on meeting the needs of the line of business. By utilizing a service-oriented approach that ensures the business can easily access and rapidly deploy the services it needs, enterprises can maximize the benefits of their private cloud deployment.

Making a service-oriented philosophy work

A service-oriented approach to a private cloud deployment can be defined as falling somewhere between pure Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). In IaaS, a developer or operations manager has to create and manage every image. For PaaS, you don’t control any of these machines; the cloud takes care of it all. In a service-oriented model, you predefine and have running in the cloud a service like a database or load balancer, so developers don’t have to recreate those every time they want to roll out a new application.

The advantage of this approach is that it simplifies the solution deployment task for IT and for the lines of business that are interacting more closely than ever through the deployment of private clouds. A service oriented approach increases reliability because you’re using standardized services and not maintaining multiple different virtual machines. It potentially lowers cost in the long run because developers spend less time setting up virtual machines and more time defining applications to take advantage of the services you’ve already deployed.

There are no real downsides to adopting a service-oriented approach. What you’re trying to do is provide some of the pre-canned capabilities you get with Platform as a Service while still giving your developers full flexibility to define the applications they want to define. For example, IT and the line of business could agree to maintain a standard PostgreSQL database image, but the line of business may have an exception where an application it really needs requires an Oracle machine. The line of business could deploy its own Oracle database server for this specific application. They have all the flexibility in the world, but they’d be responsible for maintaining that image.

Deploying a service-oriented approach doesn’t lock you into anything. It just allows you to predefine certain capabilities which will make it easier in the long run to deploy and maintain new solutions. There might be additional work for the IT staff to define the interfaces, but if you choose, you can turn to a vendor the delivers preconfigured services in the cloud.

Potential downsides

If you don’t adopt a service-oriented approach, you’re not taking advantage of measures that could improve the agility and responsiveness of the line of business. You’d be running cloud, but you would not be taking full advantage of the private cloud model.

To turn the model into a reality, you need to start by working with the line of business to analyze what services make sense to standardize across the set of services that will run in the cloud. The analysis should focus on the services that are common across all the various solutions you’re bringing to your user base. You identify the services used the most and are most similar to each other, and those that offer no advantage to being customized. IT then takes responsibility for maintaining the frequently used services and publishing APIs to let people know how to get access to them. It’s similar to what Amazon does around its relational database service. IT defines a set of services that ultimately get instantiated as cloud images, but you also define what APIs developers can take advantage of to get access to those solutions.

When does an organization know it has successfully deployed a service-oriented deployment? The short answer is, you know you’re successful when your development groups use pre-defined services instead of creating their own. This is the Amazon model: customers start off using Amazon EC2 to stand up their own application server and database server but migrate over time to using other Amazon services. If you’re taking full advantage of the cloud, it will be easier to use the newly created model, and your customers will switch as well.

The future

In the future, it’ll be easier to gear services to specific business lines because we’ll see more private cloud providers offering these services prepackaged as part of their cloud solutions. You’ll be able to deploy a set of services in your cloud – with a set of APIs and documentation that allows you to take advantage of that. The aim is to take advantage of all the value that private cloud computing has to offer, and adopting a service-oriented approach is the most direct way to accomplish this goal.

By Peter Chadwick

Pete Chadwick is senior cloud solutions manager with SUSE, a provider of interoperable Linux and cloud infrastructure.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

HOW THE CFAA RULING AFFECTS INDIVIDUALS AND PASSWORD-SHARING

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Big Data’s Significant Role In Fintech

Big Data’s Significant Role In Fintech

Data Banking Fintech covers a range of financial fields such as retail banking, investments, and lending and thanks to the mobile and internet innovations of late is a thriving sector. Offering improvements which drive customer satisfaction and education in an area previously inscrutable and dictated by gigantic inflexible corporations, fintech is helping put the power…

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Battle of the Clouds: Multi-Instance vs. Multi-Tenant

Multi-Instance vs. Multi-Tenant The cloud is part of everything we do. It’s always there backing up our data, pictures, and videos. To many, the cloud is considered to be a newer technology. However, cloud services actually got their start in the late 90s when large companies used it as a way to centralize computing, storage,…

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Infographic: 9 Things To Know About Business Intelligence (BI) Software

Business Intelligence (BI) Software  How does your company track its data? It’s a valuable resource—so much so that it’s known as Business Intelligence, or BI. But using it, integrating it into your daily processes, that can be significantly difficult. That’s why there’s software to help. But when it comes to software, there are lots of…

Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…