Guidelines For Enterprises Choosing To Migrate On The Cloud

Choosing To Migrate On The Cloud 

Categorizing the Cloud Computing Providers

Cloud providers offer a variety of services to all categories of cloud users including individuals, small businesses, and enterprises. For enterprises, the choice of type of service to subscribe is a bit intriguing task as their requirements of IT vary. Some enterprises need secure data storage while others need infrastructure-as-a-service or platform-as-a-service. The enterprise’s IT architecture is pivotal in defining the cloud service requirement. David Linthicum, an industry expert and thought leader, has categorized the services that an enterprise needs from cloud providers in his book “Cloud Computing and SOA Convergence in Your Enterprise”, excerpts of which were published by InfoWorld Media Group Inc. These categories are: storage, database, information, process, application, platform, integration, security, management, testing, and infrastructure.

How cloud providers offer these services is further categorized into two types:

Fine-grained Solutions Providers

These providers offer specific solutions to the enterprise needs and problems and do not offer complete platforms. Their services include storage, database, information, process, integration, security, management, and testing.

Coarse-grained Services Providers

These providers offer complete platform. The coarse-grained services include application, platform, and infrastructure. Of course, these so called coarse-grained services are made up of a number of fine-grained resources, for example, a platform-as-a-service provider may offer storage, process, security and testing service as a package. Though course-grained providers can meet all cloud computing needs of an enterprise and is easier to choose, the issue of optimization of resource usage becomes eminent due to different architectural requirements of different enterprises. Thus, a number of fine-grained services and solutions can better fit your IT architecture as you can choose various components of cloud computing solution to effectively meet your specific requirements. Cloud computing providers can also be categorized by enterprises based on architectural components:

1. Processes

The service components include application, platform, infrastructure, process, and integration. An example of this category is process service by Appian Anywhere.

2. Data

The service components include application, platform, infrastructure, storage, database, and information. For example, infrastructure service via Amazon Elastic Computing Cloud (EC2) and database service via Amazon Simple DB

3. Services

The service components include application, platform, infrastructure, and information. An example of this category is infrastructure service via Amazon EC2 To build a complete solution tailored to your need you can use different components from different providers. “You might store your data in Amazon Simple DB, as well as on the Amazon EC2 platform. Then, you might build and/or host the services on the Amazon EC2 platform, say, using an application server it provides on-demand within that platform”, writes Linthicum, “Finally, you could use Appian Anywhere as the platform where those processes live. Keep in mind that the processes are connected to the services, and the services are connected to the data. You’re just selecting the target platforms here.” The simplest arrangement using a single public cloud provider such as Amazon is process services for processes, infrastructure service for data, and infrastructure service for services, all via Amazon EC2.

David’s book also gives an example of a more complex service involving a number of providers as process service via Appian Anywhere and application service via Salesforce.com for processes, infrastructure service via 3Tera Cloudware and Amazon EC2, and database service via Amazon Simple DB for data, and infrastructure service via Amazon EC2 and 3Tera Cloudware, application service via salesforce.com platform service via Force.com of Salesforce.com for services.

The deployment of other components like testing, security, management, and governance may follow. They can be deployed on-site or on cloud as per need of the enterprise.

This categorization generally helps enterprises be in a better position to decide which cloud providers are the best candidates to meet the requirements of enterprise’s IT architecture.

By Krishan Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

Comics
Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…