5 Tips For Building A High Growth IT Platform

5 Tips For Building A High Growth IT Platform

5 Tips For Building a High Growth IT Platform

Building and maintaining today’s enterprise computing platforms is a lot more challenging than it was in the past. The competitive and fast moving nature of business requires a corporate network capable of meeting a company’s ever changing needs and requirements. For IT, this poses difficult challenges as its common for fast moving business to throw out many requests that can leave IT in the wake—unless the in-house IT pros strategized and have constructed a computing platform built for growth and flexibility.

So how do you build a high growth computing platform? Well, I am sure there are many thoughts and ideas on how to do this but I want to focus on five objectives, that if followed, will put you on the correct path and integrate your IT group with the business.

growth-IT

1 – A noisy platform doesn’t scale.

The computing environment needs to be able to scale up quickly based on the plethora of business requests. In order to scale effectively and efficiently you need to have a quiet, stable network platform. A noisy network cannot scale because when you grow the amount of noise, the network’s issues or instabilities grows as well and it doesn’t take long for the amplification of these issues to cause a roadblock which can ultimately lead to unacceptable downtime and outages. So, it is very important to build a stable network driven by clear process and procedures. When issues arise, nothing less than root cause analysis should be accepted by post-mortem meetings that address and correct the original problem area. Solutions that do not name the root cause should not be accepted. If you do not address the problem at its root, the issue is guaranteed to reoccur and cause more downtime, user dissatisfaction and troubleshooting time. IT pros can avoid these uncomfortable situations by addressing the problem correctly on its first occurrence.

In addition to root cause analysis, a good control process is maintaining a stable environment. All environments need to be maintained to remain stable and the number one cause of downtime is typically human error. A systematic and well-documented change control process can greatly reduce human error and increase network uptime.

2 – Embrace the Cloud where applicable.

When it comes to building stable and scalable networks most cloud enabled Managed Service Providers know how to do it right—as they should because that is their business. So, why not leverage an IaaS Managed Service provider to host your systems, provide storage and backup. You can still manage your systems and applications, but consider offloading the mundane task of worrying about server hardware, system backups, provisioning storage and other complex and costly tasks.

Leveraging the Cloud also provides a platform upon which you can quickly scale up or down in an efficient and economic manner as the business requires. Scaling up and down in the Cloud is much easier than the traditional method of putting together a requisition form, obtaining necessary approvals, sending to accounting and waiting for a purchase order, ordering and waiting 30-60 days for delivery and then another 30-60 days to get the equipment installed and tested. With the Cloud, servers and storage can be provisioned in minutes.

shutterstock_160324004

3 – Focus on saying “Yes.”

Many companies and executive teams have a perception that IT is often a roadblock, stopping progress and the achievement of business goals. The best way to erase this perception and demonstrate the value of IT to the business is by saying “yes” when the business is in need of IT services. Transform the process of interacting with IT into a positive and productive encounter and in turn, this unit will move into a strategic position. In order to say “yes” IT must have a game plan for taking on any request thrown at them. This requires the flexible, scalable and dynamic infrastructure I’ve been discussing. IT will be required to remain open minded and leverage the appropriate resources for each need, whether it be internal, external, public cloud, private cloud or SaaS. The focus must be on how to achieve the business need in a cost effective and efficient way so Shadow IT does not decide to go around you.

4 – Speed to execution trumps control.

Tying into the previous point is also the thought of speed to execution. When it comes to a project, speed to execution is more important than who controls the solution. For decades, IT has designed, implemented and managed the majority of solutions for their users. With the emergence of the Cloud and Cloud based services the mentality of where the solution resides and who controls it must be secondary to speed. Today’s businesses are in constant competition and speed to implement is often the difference between success and failure. If a solution can be implemented in the Cloud quicker than internally, with similar cost and effectiveness, then it should be considered. IT cannot place their need to control and manage a solution internally over the ability to quickly have a solution provisioned externally. Using a strategic mindset, IT pros must understand that the main objective is to meet the business needs in the best manner possible.

5 – Reduce the cost of “keeping the lights on.

It may take constant investment to keep a computing platform stable and ready for growth. Though, industry standards tell us that 80% or more of the IT budget can go towards maintenance costs. This does not allow much spend on investing in new technologies or services to keep the computing platform ready for growth in an effective and efficient manner. IT needs to find creative or more effective ways to perform their tasks to lower these maintenance costs in order to increase their budget for growth. One way to lower maintenance costs is to evaluate leveraging IaaS for server hosting, storage and backup needs. IaaS can usually lower your operation cost of servers, storage and backup by 20% -25% while giving your team time back to focus on working with the business. There are also many cost effective SaaS solutions which can lower your software budget as well as the services required to deploy, support and upgrade these software suites.

In conclusion, building a computing platform for growth not only benefits the business but will also cause the IT department to escalate within the company. IT can transform into a player at the C-level table and help set future direction once they are perceived to be a value-add to the business and not a gatekeeper. Providing value starts by enabling the business to achieve it goals and growth objectives and that is best done by building a stable, scalable and agile computing platform. I hope these tips help set you in that direction.

(Image Source: Shutterstock)

By Marc Malizia

About Marc Malizia

Marc Malizia is co-founder and CTO of RKON Technologies, responsible for the company’s overall technical vision and strategy. Since he helped start the company in 1998, Malizia has played a key role in creating many of RKON Technologies’ products and professional service offerings, as well as building the company’s internal computing platform, which serves as the basis of the brand’s cloud and managed services portfolio.

Prior to RKON Technologies, Malizia was director of engineering at LAN Systems.

Malizia holds a bachelor’s degree in computer science and mathematics from University of Illinois and a master’s degree in telecommunications from DePaul University.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Four Trends Driving Demand For Data Security In 2017

Four Trends Driving Demand For Data Security In 2017

Data Security Trends 2017 will be a hallmark year for security in the enterprise as all industries have reached a tipping point with respect to cloud and mobile adoption, forcing more and more data beyond the corporate firewall. Over 100 IT executives weighed in on their plans for 2017 in our latest survey; buried among…

How The CFAA Ruling Affects Individuals And Password-Sharing

How The CFAA Ruling Affects Individuals And Password-Sharing

Individuals and Password-Sharing With the 1980s came the explosion of computing. In 1980, the Commodore ushered in the advent of home computing. Time magazine declared 1982 was “The Year of the Computer.” By 1983, there were an estimated 10 million personal computers in the United States alone. As soon as computers became popular, the federal government…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…