Business Transformation And The IT Journey

Business Transformation And The IT Journey

Business Transformation and the IT Journey

When we look at significant business model changes during the past thirty years, technology has often been at the core. From mainframes to mini-computers to microcomputers to client/server to the Internet – technology change has been a major driver for business change.

Today, while there are certainly new technologies, it’s the way we access and consume those technologies that provides a significant impact on our business and revenue models. In other words, the business value of technology has become the driver for business change.

We can see this most clearly when we look at what we’re calling the IT Transformation Journey and its impact on the business. As organizations change the way they access and consume technology, they have become more flexible and responsive to their industries and customers.

IT Transformation Journey

As the name implies, this journey is transformational, not really step-by-step. As I outline the six stages that Logicalis has identified, think of them as stepping stones on a path, rather than landing areas. Sometimes the path is quite serial, one step follows the next, but this is not always the case for every organization.

The first step of the journey for most companies is the use of component-based architectures in their data centers. This is a traditional IT consumption model – you purchase, maintain and add or upgrade technology as needed. But the model does not scale very well. Increases in compute, network or storage resources are handled separately and often by separate IT staffs. Requests for added storage often outweigh all other requests. And there is a great deal of either under-scoping or over-scoping what is required.

The next stepping stone in the journey is virtualization, where companies can begin to realize numerous benefits including the ability to reduce their data center footprint (overgrown in the last stage) and energy consumption, more quickly provision resources and improve manageability and uptime for applications. The impact on the business is to reduce IT costs and improve access to necessary IT infrastructure.

The third stepping stone in the journey is deploying converged infrastructure. Seamlessly integrating  compute/storage/networking technologies provides a flexible, agile and easier to deploy infrastructure by delivering the efficiency and business agility of virtualization and cloud computing.   These systems provide dynamic pools of resources that can be intelligently provisioned and managed which, in turn, provides the business the ability to speed delivery of IT resources to end-users and begin to consume technology in a more flexible, managed and automated fashion.

The next two steps have to do with protection – or disaster recovery – and automation and orchestration – or the ability to treat technology as a metered service. This provides a leaner, more secure and effective IT infrastructure that can be more easily aligned with business goals.

At the end (so far) of the IT Transformation Journey is the cloud. And, just like each step before it, the cloud combines earlier benefits and offers new opportunities. But unlike the other steps, cloud computing has a transformative effect on the business. It’s not about the technology anymore. Instead, it’s about the way the business can now operate.  The technology can be consumed as a service – as needed and on-demand. And it can be turned off just as quickly.

We believe that hybrid IT will continue to be the way that most businesses consume technology – using a combination of the different steps that have come before, as well as newer cloud technologies and delivery models. This will include some premises-based, some off-premises-based and cloud-based technologies.

Business can scale up or down quickly. New products can be launched, spun out or spun down less expensively. New markets can be entered more easily. The request for additional IT resources that formerly took multiple steps with multiple IT stakeholders over a period of multiple months, can now take minutes.

The cloud is fundamentally business-model based, while using enhanced technology at its core. Businesses using the power of the cloud change from the purchase economy to the subscription economy. In other words, organizations today can (finally) focus IT resources on how to build, expand and strengthen the business, rather than how to obtain, manage and pay for technology.

The IT Transformation Journey doesn’t have a specific beginning or ending. Different organizations, depending on their existing technology and maturity, are going to begin at different points. And there will certainly be a next generation of cloud services offering additional capabilities for business. But it is a path to a more agile way of doing business.

Vince_DeLuca

By Vince DeLuca, CEO, Logicalis US

Mr. DeLuca is responsible for all aspects of Logicalis US. He joined Logicalis in 2010 as the Chief Operating Officer responsible for the overall technology/strategy of Logicalis.

Vince brings a wealth of direct experience in Information Technology and Communication. Prior to Logicalis, Vince served as Senior Vice President for Wipro with responsibility for Infrastructure Practice Service Delivery and Client Engagement. 

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…