Cooks And The Cloud

Cooks And The Cloud

Cooks And The Cloud 

Bouillabaisse is a French dish that loosely translates to fish stew. Well-made and it is one of the best dinners you will ever have. Poorly made and you will spend the night wishing you hadn’t stopped by the midnight street Bouillabaisse stand. Bouillabaisse is also a fantastic metaphor for cloud computing. Cloud Bouillabaisse is cloud soup. First off it is market driven (fresh fish = good bouillabaisse) as the cloud is (cost, cost, cost). The time taken in preparation and acquisition can greatly impact the soup you serve (Fish or Cloud). That to me is the key for cloud solutions. The time to prepare the stew is as important as how you serve it. Transitioning that to cloud solutions it’s about planning, preparing and migrating your solutions to their new cloud home.

cloud-cook

So we start with the stock. In this case the first step is the CSP you choose. I met a chef once in Paris who went every day to the fresh market to get the things for his Bouillabaisse. The same isn’t possible for cloud service providers today, someday maybe but not today. We can however evaluate the provider and the overall capacity of that provider to host our solution. Noisy neighbors, like three day old fish don’t often make a good Bouillabaisse.

Do we have the ingredients we need in our pantry?

Our initial assumption is that we have already picked the Cloud Service Provider (CSP) and that providers are able to meet our technology needs (servers and connectivity) as we start our Cloud Bouillabaisse. Frankly the CSP is a broth for our soup – bad broth equals bad soup so choose wisely. Now we carefully prepare everything we are adding. This includes planning the following “ingredients”:
· Security: what does the provider have today, what additional things do we need?

  • Migration: has the CSP done this before? It isn’t bad if they haven’t it just changes how you cook a little. Instead of sampling at various times you now have to sample all the time. More work but again we are aiming for a great stew here.
  • Migration: If the CSP hasn’t done this before go get a partner who has. Or a partner you trust to make sure as you are sampling they are continuing to stir your wonderful Cloud Bouillabaisse.
  • Cost: did we mention it has to be cheaper than the solution we are running in our data centers today? The nature of stew is not always using the best and most tender cuts of fish, simply that you cook them slowly for a long time breaking them down and making them more appetizing. We can’t break down our cloud provider by boiling them for hours, so we have to start off with the shared cost model of cloud reducing our price from day one.

Does the CSP offer the security our solution requires?

This one has been bouncing around cloud solutions for years. “The cloud is not secure.” Reality here is that in fact the cloud can be secure. Bouillabaisse is as much a process as it is a dinner. From making the stock from fish parts to cutting the vegetables it’s as much how you do it as what you do. The stringent nature of FedRAMP and the requirements around monitoring what is happening in a solution end up being game changers. Adding security monitoring to a FedRAMP cleared solution isn’t horribly hard. Expanding the operational framework to include both the monitoring for security and FedRAMP creates a stronger overall solution. However that said it critical when considering cloud solutions that you evaluate the security capabilities and offerings of your CSP carefully. Simply put it isn’t just enough to taste the Bouillabaisse from time to time, we have to make sure no one else can get into our kitchen and ruin it.

Making a fine Bouillabaisse and building a cloud solution have a lot of things in common. While I have yet to end up with Cloud on my shirt during lunch there are many other common components. Pick the right ingredients, make sure your process works and in the end serve the solution with proper garnishment. I think a fine Cloud Pumpernickel would be perfect with my Cloud Bouillabaisse.

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…

Cloud Infographic: The Future of File Storage

Cloud Infographic: The Future of File Storage

 The Future of File Storage A multi-billion dollar market Data storage has been readily increasing for decades. In 1989, an 8MB Macintosh Portable was top of the range; in 2006, the Dell Inspiron 6400 became available, boasting 160GB; and now, we have the ‘Next Generation’ MacBook Pro with 256GB of storage built in. But, of course,…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Driven by Cloud, Big Data and IoT

Digital Marketing Successful digital marketing campaigns are being driven largely by trending technologies, specifically the Internet of Things (IoT), Big Data, and The Cloud. These may be used for a huge number of marketing applications, from optimizing the performance of sports teams to improving science and research, even helping to aid law enforcement. Amazon Web…

5 Basic Safety Tips For Cloud Backups

5 Basic Safety Tips For Cloud Backups

Basic Cloud Backup Tips If you’re worried about the security of your data when it comes to cloud computing adoption, you’re not the only one. Industry experts claim that cloud computing data security is becoming an increasingly critical component in the data transmission process. And current mainstream services like Amazon’s EC2 just aren’t well-equipped enough…

15 Cloud Data Performance Monitoring Companies

15 Cloud Data Performance Monitoring Companies

Cloud Data Performance Monitoring Companies (Updated: Originally Published Feb 9th, 2015) We have decided to put together a small list of some of our favorite cloud performance monitoring services. In this day and age it is extremely important to stay on top of critical issues as they arise. These services will accompany you in monitoring…