Four Key Steps To Prepare Your IT Staff For Automation

Four Key Steps To Prepare Your IT Staff For Automation

Four Key Steps To Prepare Your IT Staff For Automation

Mind the gap between the vision of automation and the reality

Automation of IT procedures and services holds the promise of bringing tremendous efficiencies to the organization. Being able to deploy automatically, update, and repair your IT infrastructure according to approved and consistently applied procedures is key to realizing the full potential of cloud computing. Without functioning automation and orchestration procedures on the back end, all the innovation on the front end with software-as-a-service and agile, cloud-enabled applications is like trying to implement a state of the art command center supported by a bunch of frantic IT guys in the back room running on ever-accelerating treadmills.

A better long-term strategy would be to implement automation aligned with effective IT service management. This is the path you will need to navigate, but, don’t assume it’s going to be a walk in the park. Unless you tightly integrate your technology with associated processes and procedures, automation can set loose any number of devils from the details within your IT environment.

I know this from experience. Within every IT infrastructure, there are so many layers accessible by so many people with a wide range of skills and intentions that you need to approach automation very carefully.

automation

Here are four key steps you need to take to prepare your IT environment and your staff for automation:

Learn to walk before you run

  • The best way to get hands-on experience with automation is to begin with purpose-built tools that are easy to deploy, access and use. Don’t rush into the assortment of one-size-fits-all tools in the market. Without the experience, the wide array of capabilities of big tools can be overwhelming. Give yourself time to develop some understanding of what automation can do for your IT organization before you commit to a more systemic automation approach implicit in a comprehensive toolset. Start by implementing automation on a small scale, and use that direct experience to help you evaluate which capabilities you really need. Before you throw the harness over a big toolset, you need to understand strategically what you want to accomplish.

Avoid Obstacles 

  • Look for firewalls and other obstructions that could prevent automation from reaching specific areas of your IT environment. If you access a multi-tenant cloud, you have the advantage of separate environments running on shared resources, but you have also walled off each of those environments from the reach of automation. Automation has the potential to give your systems an intelligent way to respond to changing demands and capacities, but the intelligence has to come from you. Automation can’t think for itself. If you don’t tell it about the firewall, or any other impediment, the best automation script will run right into the wall.

Centralize Information

  • Look for existing processes that have built in inefficiencies. A classic example is the necessity of faxing documents for non-electronic approvals. It may be great for controls but it’s very clunky to use. If the process isn’t efficient, it isn’t going to be much improved by automation. It’s often not a technical issue. You may have a contract that requires some manual process between steps. Or you may have billing information that is isolated from the system you are automating. Automation can do a lot of things, but it can’t walk over to your accounting office and ask for data that only lives on your CFO’s laptop. You need to centralize information and have one source for the truth.

Untie The Knot

  • Look for existing controls that would conflict with automated procedures. Controls are great, but they can also be problems that need to be worked around. A good example is monitoring. You may automate a procedure for the user to turn off a Windows server, but, if you have monitoring in place, you will end up sending high-urgency alerts when the server is shut down unless you have a way to suspend monitoring as part of the automation. Basically, the left hand has to know what the right hand is trying to do, or it will have a tendency to undo it…or worse. As the scope of your automation effort expands, you have to carefully untie the knots of processes within your IT environment. Eventually, you’ll need to know everything about everything.

All these things I say with great pain because I have bumped into each one of them. Automation is an adventure. Prepare to run into the unexpected somewhere along the way.

And that’s just looking at the technical issues. Automation has to take into account all the technical complexities within your IT environment. It also has to be rolled out with a high degree of diplomacy if it is to earn the support of your IT team. Automation has the potential to free technologists and others from repetitive and/or mundane aspects of their jobs—which seems like a good thing. Eliminating aspects of what employees do for a living, however, can also make them very uneasy.

My next column will provide some guidelines to help you navigate the challenges you will encounter on your automation journey. As with any journey, setting out is not without risks, but it’s not as if you can decide to stay safe at home with the status quo. Ever increasing demands on the performance, flexibility, responsiveness, security and financial accountability of your IT environment leave you no realistic choice but to set out from wherever you are on an IT transformation journey toward the goal of a fully-realized, self-service cloud environment for your organization. It needs to be in your future.

By Brian Day

As Senior Director of Cloud Dev/Ops and Solution Development for Logicalis, Brian is responsible for managing the Logicalis Cloud and the development of new solutions.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…