Guidelines For Enterprises Choosing To Migrate On The Cloud

Choosing To Migrate On The Cloud 

Categorizing the Cloud Computing Providers

Cloud providers offer a variety of services to all categories of cloud users including individuals, small businesses, and enterprises. For enterprises, the choice of type of service to subscribe is a bit intriguing task as their requirements of IT vary. Some enterprises need secure data storage while others need infrastructure-as-a-service or platform-as-a-service. The enterprise’s IT architecture is pivotal in defining the cloud service requirement. David Linthicum, an industry expert and thought leader, has categorized the services that an enterprise needs from cloud providers in his book “Cloud Computing and SOA Convergence in Your Enterprise”, excerpts of which were published by InfoWorld Media Group Inc. These categories are: storage, database, information, process, application, platform, integration, security, management, testing, and infrastructure.

How cloud providers offer these services is further categorized into two types:

Fine-grained Solutions Providers

These providers offer specific solutions to the enterprise needs and problems and do not offer complete platforms. Their services include storage, database, information, process, integration, security, management, and testing.

Coarse-grained Services Providers

These providers offer complete platform. The coarse-grained services include application, platform, and infrastructure. Of course, these so called coarse-grained services are made up of a number of fine-grained resources, for example, a platform-as-a-service provider may offer storage, process, security and testing service as a package. Though course-grained providers can meet all cloud computing needs of an enterprise and is easier to choose, the issue of optimization of resource usage becomes eminent due to different architectural requirements of different enterprises. Thus, a number of fine-grained services and solutions can better fit your IT architecture as you can choose various components of cloud computing solution to effectively meet your specific requirements. Cloud computing providers can also be categorized by enterprises based on architectural components:

1. Processes

The service components include application, platform, infrastructure, process, and integration. An example of this category is process service by Appian Anywhere.

2. Data

The service components include application, platform, infrastructure, storage, database, and information. For example, infrastructure service via Amazon Elastic Computing Cloud (EC2) and database service via Amazon Simple DB

3. Services

The service components include application, platform, infrastructure, and information. An example of this category is infrastructure service via Amazon EC2 To build a complete solution tailored to your need you can use different components from different providers. “You might store your data in Amazon Simple DB, as well as on the Amazon EC2 platform. Then, you might build and/or host the services on the Amazon EC2 platform, say, using an application server it provides on-demand within that platform”, writes Linthicum, “Finally, you could use Appian Anywhere as the platform where those processes live. Keep in mind that the processes are connected to the services, and the services are connected to the data. You’re just selecting the target platforms here.” The simplest arrangement using a single public cloud provider such as Amazon is process services for processes, infrastructure service for data, and infrastructure service for services, all via Amazon EC2.

David’s book also gives an example of a more complex service involving a number of providers as process service via Appian Anywhere and application service via Salesforce.com for processes, infrastructure service via 3Tera Cloudware and Amazon EC2, and database service via Amazon Simple DB for data, and infrastructure service via Amazon EC2 and 3Tera Cloudware, application service via salesforce.com platform service via Force.com of Salesforce.com for services.

The deployment of other components like testing, security, management, and governance may follow. They can be deployed on-site or on cloud as per need of the enterprise.

This categorization generally helps enterprises be in a better position to decide which cloud providers are the best candidates to meet the requirements of enterprise’s IT architecture.

By Krishan Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

The Future Of Cybersecurity

The Future Of Cybersecurity

The Future of Cybersecurity In 2013, President Obama issued an Executive Order to protect critical infrastructure by establishing baseline security standards. One year later, the government announced the cybersecurity framework, a voluntary how-to guide to strengthen cybersecurity and meanwhile, the Senate Intelligence Committee voted to approve the Cybersecurity Information Sharing Act (CISA), moving it one…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Cloud Infographic: IoT For Automotive Deconstructed

Cloud Infographic: IoT For Automotive Deconstructed

IoT For Automotive Deconstructed The IoT automotive industry is moving rapidly with many exciting growth opportunities available. We’ve written about some of the risks and benefits as well as some of the players involved. One thing for certain as that the auto industry is starting to take notice and we can expect the implementation of a…

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think

Cloud Computing Is Greener Than You Think Last week we touched upon how a project in Finland had blended two of the world’s most important industries, cloud computing and green technology, to produce a data centre that used nearby sea water to both cool their servers and heat local homes.  Despite such positive environmental projects, there…