Guidelines For Enterprises Choosing To Migrate On The Cloud

Choosing To Migrate On The Cloud 

Categorizing the Cloud Computing Providers

Cloud providers offer a variety of services to all categories of cloud users including individuals, small businesses, and enterprises. For enterprises, the choice of type of service to subscribe is a bit intriguing task as their requirements of IT vary. Some enterprises need secure data storage while others need infrastructure-as-a-service or platform-as-a-service. The enterprise’s IT architecture is pivotal in defining the cloud service requirement. David Linthicum, an industry expert and thought leader, has categorized the services that an enterprise needs from cloud providers in his book “Cloud Computing and SOA Convergence in Your Enterprise”, excerpts of which were published by InfoWorld Media Group Inc. These categories are: storage, database, information, process, application, platform, integration, security, management, testing, and infrastructure.

How cloud providers offer these services is further categorized into two types:

Fine-grained Solutions Providers

These providers offer specific solutions to the enterprise needs and problems and do not offer complete platforms. Their services include storage, database, information, process, integration, security, management, and testing.

Coarse-grained Services Providers

These providers offer complete platform. The coarse-grained services include application, platform, and infrastructure. Of course, these so called coarse-grained services are made up of a number of fine-grained resources, for example, a platform-as-a-service provider may offer storage, process, security and testing service as a package. Though course-grained providers can meet all cloud computing needs of an enterprise and is easier to choose, the issue of optimization of resource usage becomes eminent due to different architectural requirements of different enterprises. Thus, a number of fine-grained services and solutions can better fit your IT architecture as you can choose various components of cloud computing solution to effectively meet your specific requirements. Cloud computing providers can also be categorized by enterprises based on architectural components:

1. Processes

The service components include application, platform, infrastructure, process, and integration. An example of this category is process service by Appian Anywhere.

2. Data

The service components include application, platform, infrastructure, storage, database, and information. For example, infrastructure service via Amazon Elastic Computing Cloud (EC2) and database service via Amazon Simple DB

3. Services

The service components include application, platform, infrastructure, and information. An example of this category is infrastructure service via Amazon EC2 To build a complete solution tailored to your need you can use different components from different providers. “You might store your data in Amazon Simple DB, as well as on the Amazon EC2 platform. Then, you might build and/or host the services on the Amazon EC2 platform, say, using an application server it provides on-demand within that platform”, writes Linthicum, “Finally, you could use Appian Anywhere as the platform where those processes live. Keep in mind that the processes are connected to the services, and the services are connected to the data. You’re just selecting the target platforms here.” The simplest arrangement using a single public cloud provider such as Amazon is process services for processes, infrastructure service for data, and infrastructure service for services, all via Amazon EC2.

David’s book also gives an example of a more complex service involving a number of providers as process service via Appian Anywhere and application service via Salesforce.com for processes, infrastructure service via 3Tera Cloudware and Amazon EC2, and database service via Amazon Simple DB for data, and infrastructure service via Amazon EC2 and 3Tera Cloudware, application service via salesforce.com platform service via Force.com of Salesforce.com for services.

The deployment of other components like testing, security, management, and governance may follow. They can be deployed on-site or on cloud as per need of the enterprise.

This categorization generally helps enterprises be in a better position to decide which cloud providers are the best candidates to meet the requirements of enterprise’s IT architecture.

By Krishan Lal Khatri

About Krishan Lal Khatri

Krishan is a technology researcher and writer with over 12 years experience in telecommunication industry. He has a masters degree in Electronic Engineering and is member of IEEE and ISOC. He has worked with leading telecommunication service providers in Pakistan and United Arab Emirates for 10 years and then switched to teaching and research by joining a public sector university. He is currently pursuing PhD in Electrical Engineering.

View All Articles

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…