Guidelines For Enterprises Choosing To Migrate On The Cloud

Choosing To Migrate On The Cloud 

Categorizing the Cloud Computing Providers

Cloud providers offer a variety of services to all categories of cloud users including individuals, small businesses, and enterprises. For enterprises, the choice of type of service to subscribe is a bit intriguing task as their requirements of IT vary. Some enterprises need secure data storage while others need infrastructure-as-a-service or platform-as-a-service. The enterprise’s IT architecture is pivotal in defining the cloud service requirement. David Linthicum, an industry expert and thought leader, has categorized the services that an enterprise needs from cloud providers in his book “Cloud Computing and SOA Convergence in Your Enterprise”, excerpts of which were published by InfoWorld Media Group Inc. These categories are: storage, database, information, process, application, platform, integration, security, management, testing, and infrastructure.

How cloud providers offer these services is further categorized into two types:

Fine-grained Solutions Providers

These providers offer specific solutions to the enterprise needs and problems and do not offer complete platforms. Their services include storage, database, information, process, integration, security, management, and testing.

Coarse-grained Services Providers

These providers offer complete platform. The coarse-grained services include application, platform, and infrastructure. Of course, these so called coarse-grained services are made up of a number of fine-grained resources, for example, a platform-as-a-service provider may offer storage, process, security and testing service as a package. Though course-grained providers can meet all cloud computing needs of an enterprise and is easier to choose, the issue of optimization of resource usage becomes eminent due to different architectural requirements of different enterprises. Thus, a number of fine-grained services and solutions can better fit your IT architecture as you can choose various components of cloud computing solution to effectively meet your specific requirements. Cloud computing providers can also be categorized by enterprises based on architectural components:

1. Processes

The service components include application, platform, infrastructure, process, and integration. An example of this category is process service by Appian Anywhere.

2. Data

The service components include application, platform, infrastructure, storage, database, and information. For example, infrastructure service via Amazon Elastic Computing Cloud (EC2) and database service via Amazon Simple DB

3. Services

The service components include application, platform, infrastructure, and information. An example of this category is infrastructure service via Amazon EC2 To build a complete solution tailored to your need you can use different components from different providers. “You might store your data in Amazon Simple DB, as well as on the Amazon EC2 platform. Then, you might build and/or host the services on the Amazon EC2 platform, say, using an application server it provides on-demand within that platform”, writes Linthicum, “Finally, you could use Appian Anywhere as the platform where those processes live. Keep in mind that the processes are connected to the services, and the services are connected to the data. You’re just selecting the target platforms here.” The simplest arrangement using a single public cloud provider such as Amazon is process services for processes, infrastructure service for data, and infrastructure service for services, all via Amazon EC2.

David’s book also gives an example of a more complex service involving a number of providers as process service via Appian Anywhere and application service via Salesforce.com for processes, infrastructure service via 3Tera Cloudware and Amazon EC2, and database service via Amazon Simple DB for data, and infrastructure service via Amazon EC2 and 3Tera Cloudware, application service via salesforce.com platform service via Force.com of Salesforce.com for services.

The deployment of other components like testing, security, management, and governance may follow. They can be deployed on-site or on cloud as per need of the enterprise.

This categorization generally helps enterprises be in a better position to decide which cloud providers are the best candidates to meet the requirements of enterprise’s IT architecture.

By Krishan Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Fintech Investments Are Seeing Consistent Growth

Fintech Investments Are Seeing Consistent Growth

The Financial Services Cloud Fintech investment has been seeing consistent growth in 2015, with some large moves being made this year. The infographic (Courtesy of Venturescanner) below shows the top Fintech investors and the amount of companies they’re currently funding: Just this week, a financial data startup known as Orchard Platform raised $30 million in…

Are Women Discriminated Against In The Tech Sector?

Are Women Discriminated Against In The Tech Sector?

Women Discriminated Against In Tech Sector It is no secret that the tech industry is considered sexist since most women are paid less than men; there are considerably fewer women in tech jobs; and generally men get promoted above women. Yet the irony is twofold. Firstly, there is an enormous demand for employees with skills…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…