How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

In my last article I discussed the importance of conducting a comprehensive assessment of your current IT environment before deciding on any kind of a cloud strategy. To summarize: you must know exactly where you are before you can accurately chart a course to where you want to be along the IT transformation journey.

Usually, there is a clear business case for performing systematic and strategic remediation of your onsite IT environment to get it running as effectively and efficiently as possible. Unless, of course, your assessment revealed so many problems that you no longer want to operate your own IT environment and are in a position to make an immediate and total move—i.e., start over— in a cloud environment.

Your cloud environment will be a totally honest reflection of your on premise environment. That means, if your on premises environment is under- or over-utilized, your cloud environment will be as well. Simply moving an inefficient environment to the cloud will not by itself make it any more efficient.

The best approach—and the focus of this article—will be how to get the greatest payback from the information you collected during your assessment by performing remediation of inefficient systems—physical and virtual. The good news is that there are many short term benefits from remediation as part of a thoughtful strategy that ensures the upgrades you make to each component contribute to the development of a converged infrastructure. To avoid bouncing off the guardrails on your IT transformation journey you need to align each new project that crosses your desk with your long-term vision. The strategic choice might be more expensive in the short term, but nothing is as expensive as finding yourself in a technological dead-end that forces you to start over.

Let’s look at a few key topics.

Virtualization

Many IT directors think they are much more virtualized than they actually are. According to reseach, a typical IT environment is about 50 percent virtualized. That, obviously, leaves the other 50 percent to be virtualized. The ROI and other benefits of extending virtualization are well established.

Besides the need to extend virtualization, most organizations need to rationalize the systems they have virtualized. It is all too common to see where 100 physical servers have been transformed into 200 or more…sometimes many more…virtual servers.

It doesn’t take much to create them, but virtual machines have the same support, security and compliance issues that physical machines do. The cost of server sprawl, as a result, can be significant. After evaluating one organization’s virtual environment recently, for example, we told them that, if they spent some money on remediation, we would be able to charge them half of what it would cost per month if we had to manage their existing environment unchanged. The bottom line: Every dollar they invested up front would be paid back manyfold in a short period of time.

Remediation of virtual environments is directly related to remediation of management abilities through the development and execution of ITIL best practices as part of an IT service management (ITSM) strategy. We’ll return to this topic in a subsequent blog. Let’s go back to the physical enironment for a bit.

Blade Servers

Blade technology has initiated a wave of change through everything in the data center. Blades are modular, need fewer cables, require less floor space, use less power, require less cooling and can be managed by integrated management tools. These and other dramatic efficiencies enabled the blade form factor to take the data center by storm. A key advantage of introducing blades to your data center is that your investment in the blade chassis is protected over time because you can always add additional blades, unlike money spent on maintaining older technology for which there is no roadmap to the future.

Converged Storage

The prevailing tendency in most organizations has been to buy more storage than you need—“just to be sure.” Predictably, the tendency to over-buy has filled many data centers with a variety of storage devices all performing at a small percentage of their designed performance—kind of like where servers were before virtualization when the rule of thumb was a server for every application.

Ultimately, you will be able to implement a common storage platform that will make it possible to dynamically select the best storage configuration for a specific application from a menu that includes all the choices. In the meantime, organizations need to carefully select a specific storage solution that meets their current needs and leaves their future options open.

That means implemening converged storage area networks (SANs) for your virtual server farms. Converged SANs lets you assign virtual storage and provide high availability with commands from the hypervisor environment, just the way you manage virtual servers. That your attached storage is controlled and managed by hypervisor is what makes it “converged.” We do have to keep an eye on the industry and where storage is headed. Recent advancements in flash and direct-attached storage may soon provide services that were traditionally only supported through a SAN.

The ideal goal, of course, is to get everything into the converged infrastructure where you have lowest costs per port, the lowest cost for SAN storage, for compute resource…for everything, compared to a discrete physical environment; and you can take advantage of the dynamic movement, self provisioning, scaling and all the benefits of shared resources model.

My next article will look at how to can break down the traditional silos of specialites that exist today in most IT departments like feudal baronies in constant territorial disputes with each other. To advance along the IT transformation journey, your IT team is going to have to learn to get along.

By Kevin Gruneisen, Logicalis Senior Director Cloud and Data Center Solutionskevin

Kevin has nearly 30 years of experience in the Infrastructure Technology business. His key responsibilities at Logicalis are focused on matching Logicalis’ capabilities with the cloud and data center needs of its customers. Kevin joined Logicalis in 2004 when Logicalis acquired Solution Technology, Inc. He began his career in technology with IBM in 1984. 

For more information, Kevin recommends IT pros explore the IT Transformation Journey, a microsite dedicated to this topic, at www.unlikeanycloud.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…