How To Set Off With Confidence On The Road To Cloud Computing

How To Set Off With Confidence On The Road To Cloud Computing

How to Set Off with Confidence on the Road to Cloud Computing

At its most basic level, traveling along the IT transformation journey from conventional data centers to the dynamic, intelligent environments of cloud computing is an adventure in self discovery that has a way of changing you as much as your technology.

You may start out thinking you know who you are and where you are going, but as you dig deeper into cloud computing, your goals will inevitably change as your awareness of who you are expands.

No Leap of Faith Required

The good news is that it is possible to start the journey toward cloud computing one step at a time from wherever you are, and even realize some efficiencies and performance rewards in the early stages. No leap of faith required. Implementing cloud computing is a pragmatic decision that needs to be executed with a painstaking attention to detail and a deep and broad understanding of your organization.

It can be a challenging process, but the payback is worth it: If you can define it in enough detail, you can have it. The first step is knowing where you are today.

A comprehensive assessment of your IT environment begins by identifying what’s in it. There are off-the-shelf tools available to collect data on everything in your environment. For example, there are tools that inventory every device in your physical environment, others that examine your virtual environment and others that look at your application layer. No one tool is going to be enough. You need to determine more than just how many devices you have, you also need to understand where your systems are under or over-utilized as well as the dependencies of the various workloads.

A detailed assessment will identify what resources are being used effectively as well as where there are inefficiencies associated with server sprawl. A large enterprise I visited recently had multiple, highly-virtualized server farms. An examination of how these resources were being used, however, revealed that one was only operating at 20 percent capacity and another one the same size was only 30 percent utilized. It’s great that their server farms are highly-virtualized, but inefficient server farms — virtualized or not — still waste time and money. And moving an inefficient virtualized environment to the cloud does not make it intrinsically any more efficient.

If someone screams…

During your initial cloud assessment you also need to look at the condition of the data center facilities where your virtual infrastructures live: Are they energy efficient, are they overheating, are they overcrowded?

I met with an IT director recently whose data center was jammed full of devices, only half of which were turned on. When I asked him how he knew what systems he actually needed, he said, “I turn it off, and, if someone screams, I know I need it, and I turn it back on.” A detailed assessment of your IT environment in preparation for a move to the cloud can provide the data you need to progress from a reactive to a proactive, approach to IT management. Instead of having to guess if an asset is needed or not, you will know.

The status of disaster recovery and business continuity is another area of uncertainty in many IT environments. Most IT departments have a DR plan, but too many haven’t updated it on a regular basis. They dutifully send their tapes off to some storage facility and think they are protected. A review of the availability requirements for mission critical data can be a startling eye opener. Having to send off a team of technicians to the tape storage provider to download their raw data and return with a trunk full of tapes that still need to be uploaded, may not, in fact, be possible within an acceptable recovery window.

While you are reviewing your DR plan, you should also re-evaluate available DR services. Advances like DRaaS with high availability replication can recover your data and have you up and running in hours instead of days…or longer. Thinking about DR, as a result, has become a whole lot easier  for those IT directors who are willing to evaluate their risk of downtime and consider new ways of protecting their data.

Across the Aisle

Just assessing your technology environment is not enough. A comprehensive assessment should look at your organization from three distinct points of view: your technology team, the business leaders IT serves and the finance executives who have to agree to pay for it all. The true potential of cloud technology can only be realized by tightly aligning technology with business objectives.

A healthy relationship between IT and business leaders is a good sign that an organization has the level of cooperation and maturity it will need to successfully leverage cloud computing. I could tell one organization was ready to move forward with a cloud strategy by the way the CIO answered a single question: When I asked what challenges IT had with business leaders, he said, “None. The first thing I did when I got here was set up a taskforce with IT and business stakeholders that focuses on how we align business with IT throughout the organization.”

This CIO knew the flexibility and efficiencies that cloud computing could mean for his IT environment. As important, the business leaders could see how cloud computing would respond more quickly and effectively to their needs, and the CFO understood the value of being able to pay for technology as needed from the operating budget, as opposed to paying in advance from the capital budget for future capacity that they may or may not end up needing. Cloud computing can only succeed if it has buy-in from the top down, and the top needs to understand what they are buying into.

Your Cloud. Your Way.

Most cloud providers and purveyors of cloud technology like to act as if they have all the answers. In fact, you are the only one who really does. The goal isn’t to be able to see cloud computing from their perspective, but to use the viewpoint of cloud computing to see yourself and your business needs more clearly and in more detail. Knowing who you are today will provide you with everything you need to critically evaluate what cloud providers have to offer. You need to be able to do more than just access a cloud environment. Lots of providers can give you access to raw cloud environments. The real value comes from accessing a cloud environment that is designed to be a secure, flexible, highly available extension of your overall, unique IT environment. Don’t settle for anything less.

Dazzling promises, emerging standards and other baffling changes constantly swirl around cloud computing technology. Don’t be distracted. The most important consideration — in fact, the only consideration you need to worry about — is what cloud technology means to you.

My next blog will look at how you take the information you have collected in your assessments and design a cloud strategy that fits your unique set of challenges and resources.

By Kevin Gruneisen, Logicalis Senior Director Cloud and Data Center Solutionskevin

Kevin has nearly 30 years of experience in the Infrastructure Technology business. His key responsibilities at Logicalis are focused on matching Logicalis’ capabilities with the cloud and data center needs of its customers. Kevin joined Logicalis in 2004 when Logicalis acquired Solution Technology, Inc. He began his career in technology with IBM in 1984. 

For more information, Kevin recommends IT pros explore the IT Transformation Journey, a microsite dedicated to this topic, at www.unlikeanycloud.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

What Futuristic Tech Will You See In Your Lifetime?

What Futuristic Tech Will You See In Your Lifetime?

Futuristic Tech The world and what people can do is increasingly being driven by technology. It has already shaped the world we live in, but over the next few decades it is set to shape the world in ways that we can barely imagine. There have already been some great leaps in IoT technology recently,…

The Lighter Side Of The Cloud – Hiding Spots

The Lighter Side Of The Cloud – Hiding Spots

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via@cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Exploiting AI and Blockchain Technology

Fintech Exploiting AI and Blockchain Technology

AI and Blockchain Technology The field of artificial intelligence (AI) had progressed rapidly in the last ten years, though first recognized in the 1950s. From autonomous motor vehicles to digital personal assistants, the technology is making its way into a variety of industries, enabling better task automation, language processing, and data analytics. But more recently,…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Infographic: The Evolving Internet of Things

Infographic: The Evolving Internet of Things

Evolving Internet of Things  The Internet of Things, or IoT, a term devised in 1999 by British entrepreneur Kevin Ashton, represents the connection of physical devices, systems and services via the internet, and Gartner and Lucas Blake’s new infographic (below) explores the evolution of the IoT industry, investigating its potential impact across just about every…

Cloud Computing Then & Now

Cloud Computing Then & Now

The Evolving Cloud  From as early as the onset of modern computing, the possibility of resource distribution has been explored. Today’s cloud computing environment goes well beyond what most could even have imagined at the birth of modern computing and innovation in the field isn’t slowing. A Brief History Matillion’s interactive timeline of cloud begins…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…

4 Different Types of Attacks – Understanding the “Insider Threat”

4 Different Types of Attacks – Understanding the “Insider Threat”

Understanding the “Insider Threat”  The revelations that last month’s Sony hack was likely caused by a disgruntled former employee have put a renewed spotlight on the insider threat. The insider threat first received attention after Edward Snowden began to release all sorts of confidential information regarding national security. While many called him a hero, what…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Offers Key Benefits For Small, Medium Businesses

Cloud Computing Benefits A growing number of small and medium businesses in the United States rely on as a means of deploying mission-critical software products. Prior to the advent of cloud-based products — software solutions delivered over the Internet – companies were often forced to invest in servers and other products to run software and…