How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

How To Use Remediation To Accelerate Your IT Transformation Journey To The Cloud

In my last article I discussed the importance of conducting a comprehensive assessment of your current IT environment before deciding on any kind of a cloud strategy. To summarize: you must know exactly where you are before you can accurately chart a course to where you want to be along the IT transformation journey.

Usually, there is a clear business case for performing systematic and strategic remediation of your onsite IT environment to get it running as effectively and efficiently as possible. Unless, of course, your assessment revealed so many problems that you no longer want to operate your own IT environment and are in a position to make an immediate and total move—i.e., start over— in a cloud environment.

Your cloud environment will be a totally honest reflection of your on premise environment. That means, if your on premises environment is under- or over-utilized, your cloud environment will be as well. Simply moving an inefficient environment to the cloud will not by itself make it any more efficient.

The best approach—and the focus of this article—will be how to get the greatest payback from the information you collected during your assessment by performing remediation of inefficient systems—physical and virtual. The good news is that there are many short term benefits from remediation as part of a thoughtful strategy that ensures the upgrades you make to each component contribute to the development of a converged infrastructure. To avoid bouncing off the guardrails on your IT transformation journey you need to align each new project that crosses your desk with your long-term vision. The strategic choice might be more expensive in the short term, but nothing is as expensive as finding yourself in a technological dead-end that forces you to start over.

Let’s look at a few key topics.

Virtualization

Many IT directors think they are much more virtualized than they actually are. According to reseach, a typical IT environment is about 50 percent virtualized. That, obviously, leaves the other 50 percent to be virtualized. The ROI and other benefits of extending virtualization are well established.

Besides the need to extend virtualization, most organizations need to rationalize the systems they have virtualized. It is all too common to see where 100 physical servers have been transformed into 200 or more…sometimes many more…virtual servers.

It doesn’t take much to create them, but virtual machines have the same support, security and compliance issues that physical machines do. The cost of server sprawl, as a result, can be significant. After evaluating one organization’s virtual environment recently, for example, we told them that, if they spent some money on remediation, we would be able to charge them half of what it would cost per month if we had to manage their existing environment unchanged. The bottom line: Every dollar they invested up front would be paid back manyfold in a short period of time.

Remediation of virtual environments is directly related to remediation of management abilities through the development and execution of ITIL best practices as part of an IT service management (ITSM) strategy. We’ll return to this topic in a subsequent blog. Let’s go back to the physical enironment for a bit.

Blade Servers

Blade technology has initiated a wave of change through everything in the data center. Blades are modular, need fewer cables, require less floor space, use less power, require less cooling and can be managed by integrated management tools. These and other dramatic efficiencies enabled the blade form factor to take the data center by storm. A key advantage of introducing blades to your data center is that your investment in the blade chassis is protected over time because you can always add additional blades, unlike money spent on maintaining older technology for which there is no roadmap to the future.

Converged Storage

The prevailing tendency in most organizations has been to buy more storage than you need—“just to be sure.” Predictably, the tendency to over-buy has filled many data centers with a variety of storage devices all performing at a small percentage of their designed performance—kind of like where servers were before virtualization when the rule of thumb was a server for every application.

Ultimately, you will be able to implement a common storage platform that will make it possible to dynamically select the best storage configuration for a specific application from a menu that includes all the choices. In the meantime, organizations need to carefully select a specific storage solution that meets their current needs and leaves their future options open.

That means implemening converged storage area networks (SANs) for your virtual server farms. Converged SANs lets you assign virtual storage and provide high availability with commands from the hypervisor environment, just the way you manage virtual servers. That your attached storage is controlled and managed by hypervisor is what makes it “converged.” We do have to keep an eye on the industry and where storage is headed. Recent advancements in flash and direct-attached storage may soon provide services that were traditionally only supported through a SAN.

The ideal goal, of course, is to get everything into the converged infrastructure where you have lowest costs per port, the lowest cost for SAN storage, for compute resource…for everything, compared to a discrete physical environment; and you can take advantage of the dynamic movement, self provisioning, scaling and all the benefits of shared resources model.

My next article will look at how to can break down the traditional silos of specialites that exist today in most IT departments like feudal baronies in constant territorial disputes with each other. To advance along the IT transformation journey, your IT team is going to have to learn to get along.

By Kevin Gruneisen, Logicalis Senior Director Cloud and Data Center Solutionskevin

Kevin has nearly 30 years of experience in the Infrastructure Technology business. His key responsibilities at Logicalis are focused on matching Logicalis’ capabilities with the cloud and data center needs of its customers. Kevin joined Logicalis in 2004 when Logicalis acquired Solution Technology, Inc. He began his career in technology with IBM in 1984. 

For more information, Kevin recommends IT pros explore the IT Transformation Journey, a microsite dedicated to this topic, at www.unlikeanycloud.com.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Cloud Computing – The Real Story Is About Business Strategy, Not Technology

Enabling Business Strategies The cloud is not really the final destination: It’s mid-2015, and it’s clear that the cloud paradigm is here to stay. Its services are growing exponentially and, at this time, it’s a fluid model with no steady state on the horizon. As such, adopting cloud computing has been surprisingly slow and seen more…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…