The Lighter Side Of The Cloud – The Crash
The Lighter Side Of The Cloud – The Name Game
The Lighter Side Of The Cloud – Baseball Data

IT as a Service (ITaaS), What Businesses Are In For

IT as a Service (ITaaS), what Businesses are in for

There are so many models under XaaS that it is becoming hard to keep track of them all. We have PaaS, SaaS, IaaS, NaaS, and MaaS just to name a few of the more common ones and we have new ones being developed as we speak. Now let’s add another one to that list. IT as a service just recently came into the scene and from the name alone it seems that it sounds like “Everything as a Service.” However, this is not really a service model, but rather a new delivering model or operating platform. How’s that for confusing?

ITaaS does not really belong under XaaS, I just wanted to hammer it down back there. ITaaS in simple terms basically means that IT is being offered as a service along with whatever services and technology that entails. The service revolves around various IT services, rather than technology, being offered mostly through the cloud. But physical delivery is often used in conjunction with remote services as well.

Though this has been around for a while in some form or another, the cloud is the best enabler for ITaaS which allows service providers global reach with very powerful tools that help customers achieve their goals. And since legacy apps are not really going away anytime soon, there are still a lot of business that use COBOL apps and similarly old programs, ITaaS packages services and applications to be used by different users within the organization. In fact, most ITaaS providers provide services to their own organization rather than to third party customers.

But organizations going into ITaaS make some very bad fundamental decisions. They tend to be too technology-centric, which is not normally bad, but it can have some dire repercussions in this case. They focus on how to deploy hybrid cloud systems on top of their existing systems and then focus on how to deliver the services that they require. This often ends up as half-baked and overly pricey ventures. The correct approach would be to become customer-centric. If an organization is serious about ITaaS, it should start its planning with the business users and the applications and services they need and not with the technology management wants.

They should start by asking questions like:

  1. What applications and services do the users and developers need in order to be efficient and/or be innovative?
  2. How will the overall business process change when these applications and services are deployed?
  3. Will it actually promote innovative and cost-effectiveness and can our IT pull this off?

In short, it should be user demand that drive the ITaaS design and approach rather than infrastructure.

By Abdul Salam

Abdul

Abdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree in Information Technology followed by a postgraduate degree in Business Informatics. Abdul possess over 3 years’ experience in technical & business writing with deep knowledge in Cloud Computing, VMware,Oracle, Oracle ERP, Cloud ERP, Microsoft Technologies and Network Communications (Cisco, Juniper). Visit his LinkedIn profile at: http://linkd.in/TtFu7X

Sorry, comments are closed for this post.

Popular Archives

5 Considerations You Need To Review Before Investing In Data Analytics

5 Considerations You Need To Review Before Investing In Data Analytics

Review Before Investing In Data Analytics Big data, when handled properly, can lead to big change. Companies in a wide variety of industries are partnering with data analytics companies to increase operational efficiency and make evidence-based business decisions. From Kraft Foods using business intelligence (BI) to cut customer satisfaction analysis time in half, to a…

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype

Cloud-Based VOIP – 4 Alternatives To Skype Skype is the most popular cloud-based VOIP service. Since being bought out by Microsoft for $8.5 billion in 2011 the company has grown to more than 300 million users and now accounts for 34% of all international calls. Some people don’t want to use Skype though. Reports of…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About…

Recent

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue At RSA

Cloud Security Hottest Issue The integral integration of cyber security and cloud technology seemed to be the hottest issue at the busy RSA 2015 Conference in San Francisco. Interested parties packed security and cloud service booths for the duration of the conference. Several prominent publications covered the increased importance of securing their private information that’s…

Imperfect Security: The RSA Conference And The Illusion Of Safety

Imperfect Security: The RSA Conference And The Illusion Of Safety

The RSA Conference And The Illusion Of Safety This year’s 2015 RSA Conference is taking place from April 20th to 24th, in San Francisco, California. Here, security leaders from across the vast expanse of tech, politics, and more will gather to discuss the past, present, and future of security. From application security to technology infrastructure,…

The Lighter Side Of The Cloud – Day 5

The Lighter Side Of The Cloud – Day 5

By David Fletcher Are you looking to supercharge your Newsletter, Powerpoint presentation, Social media campaign or Website? Our universally recognized tech related comics can help you. Contact us for information on our commercial licensing rates. About Latest Posts AbdulAbdul Salam is IT professional and an accomplished technical writer with CloudTweaks. He earned his undergraduate degree…

Contact Us

Sending

Technology Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7 200px-KPMG

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

CloudTweaks Comic Library

Advertising