Are Choices Clouding The IT Department?

Are Choices Clouding The IT Department?

As consumers, we are exposed to an infinite amount of choices in what we buy, wear and eat – whether this is a consequence of globalization or our dependency on the internet is irrelevant, but it has now begun to represent a real challenge for the IT department or administrator. For years, IT has created efficiency and reduced the support overhead by creating “standard” environments and platforms, effectively creating an underlying IT infrastructure with one size fits all mentality. With the rise of cloud technologies and services, the IT consumer is already presented with the choices that they want. IT has found it hard to adapt and become the enabler in providing that same choice to their customers.

The IT department still needs to consider its own costs and efficiency. It is not as simple as creating multiple service offerings for the consumer. In the modern world, where the IT consumer expects choice and self-service the IT department needs a single platform that enables them to deliver just that! The technology world has transformed, there are various combinations of choices in compute, storage, networking and services that software will provide on top of that underling infrastructure. The IT department needs a single management platform that abstracts the consumer from the underlying complexity in those infrastructure technologies but still allows them to choose which is the right combination of technology for the task in hand, or service that they are creating. IT simply needs a single platform that offers multiple tiers of service.

We are naturally transitioning to a self-service cloud enabled world where we expect to have choices in order to customize our interaction with IT. We have that choice already through our smartphones and tablets, but more and more IT consumers expect to be offered real choice in the IT services that they consume.

For example, my development team are in the early proof of concept stage of a creating a new application. At this stage, they are in short development cycles, and their core requirement is agility. They don’t need high performance servers or the latest SSD storage. As the development of the application matures they need to start considering the performance and availability that is required in the production and their core requirements change. By creating multiple tiers of service the first environment would be on a low tier, using commodity hardware and storage, and perhaps a free hypervisor. As time goes on, its time to move the application to a higher tier in the stack. A hardware and software stack that mirrors production. The key here is providing the choice to the IT consumer through a single platform which enables them to make choose the service tier that they want through self-service.

So to answer my earlier question, are choices clouding IT, to that I would have to say no. More choice = more flexibility.

By Steve Rushen,

Steve Rushen, Sr. Director Services and Support at Abiquo which is focused on helping customers build successful Cloud services. To contact Steve for more information you can reach him at steve.rushen@abiquo.com or on Twitter @SteveRushen

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…