Guidelines For Enterprises Choosing To Migrate On The Cloud

Choosing To Migrate On The Cloud 

Categorizing the Cloud Computing Providers

Cloud providers offer a variety of services to all categories of cloud users including individuals, small businesses, and enterprises. For enterprises, the choice of type of service to subscribe is a bit intriguing task as their requirements of IT vary. Some enterprises need secure data storage while others need infrastructure-as-a-service or platform-as-a-service. The enterprise’s IT architecture is pivotal in defining the cloud service requirement. David Linthicum, an industry expert and thought leader, has categorized the services that an enterprise needs from cloud providers in his book “Cloud Computing and SOA Convergence in Your Enterprise”, excerpts of which were published by InfoWorld Media Group Inc. These categories are: storage, database, information, process, application, platform, integration, security, management, testing, and infrastructure.

How cloud providers offer these services is further categorized into two types:

Fine-grained Solutions Providers

These providers offer specific solutions to the enterprise needs and problems and do not offer complete platforms. Their services include storage, database, information, process, integration, security, management, and testing.

Coarse-grained Services Providers

These providers offer complete platform. The coarse-grained services include application, platform, and infrastructure. Of course, these so called coarse-grained services are made up of a number of fine-grained resources, for example, a platform-as-a-service provider may offer storage, process, security and testing service as a package. Though course-grained providers can meet all cloud computing needs of an enterprise and is easier to choose, the issue of optimization of resource usage becomes eminent due to different architectural requirements of different enterprises. Thus, a number of fine-grained services and solutions can better fit your IT architecture as you can choose various components of cloud computing solution to effectively meet your specific requirements. Cloud computing providers can also be categorized by enterprises based on architectural components:

1. Processes

The service components include application, platform, infrastructure, process, and integration. An example of this category is process service by Appian Anywhere.

2. Data

The service components include application, platform, infrastructure, storage, database, and information. For example, infrastructure service via Amazon Elastic Computing Cloud (EC2) and database service via Amazon Simple DB

3. Services

The service components include application, platform, infrastructure, and information. An example of this category is infrastructure service via Amazon EC2 To build a complete solution tailored to your need you can use different components from different providers. “You might store your data in Amazon Simple DB, as well as on the Amazon EC2 platform. Then, you might build and/or host the services on the Amazon EC2 platform, say, using an application server it provides on-demand within that platform”, writes Linthicum, “Finally, you could use Appian Anywhere as the platform where those processes live. Keep in mind that the processes are connected to the services, and the services are connected to the data. You’re just selecting the target platforms here.” The simplest arrangement using a single public cloud provider such as Amazon is process services for processes, infrastructure service for data, and infrastructure service for services, all via Amazon EC2.

David’s book also gives an example of a more complex service involving a number of providers as process service via Appian Anywhere and application service via Salesforce.com for processes, infrastructure service via 3Tera Cloudware and Amazon EC2, and database service via Amazon Simple DB for data, and infrastructure service via Amazon EC2 and 3Tera Cloudware, application service via salesforce.com platform service via Force.com of Salesforce.com for services.

The deployment of other components like testing, security, management, and governance may follow. They can be deployed on-site or on cloud as per need of the enterprise.

This categorization generally helps enterprises be in a better position to decide which cloud providers are the best candidates to meet the requirements of enterprise’s IT architecture.

By Krishan Lal Khatri

Frank Suglia
Migrating Microsoft Office 2013 As of April 11, 2023, Microsoft will stop supporting Office 2013. The decision to end support for Office 2013 should come as no surprise. Over the past several years, Microsoft has ...
Stacey Farrar
Modern Auth and Exchange Online Migrations Microsoft has phased out Basic Authentication (Basic Auth), replacing it with Modern Authentication (Modern Auth) to provide increased protection and user security. Through this, Microsoft has turned off Basic ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Mark Greenlaw
Free Cloud Migrations are Expensive The cloud is becoming the primary place where work gets done. By 2025, Gartner estimates that enterprise spending on public cloud computing will overtake traditional IT hardware. Why? One reason ...
Sofia Jaramillo
Augmented Reality in Architecture Augmented reality (AR) is a growing field of study and application in the world of architecture. This useful tool can help us visualize architectural designs by superimposing them onto real-world scenes ...
Metasploit-Penetration-Testing-Software-Pen-Testing-Security
Vulnerability Scanners Cyber security vulnerabilities are a constant nuisance and it certainly doesn't help with the world in a current state of disarray and uncertainty. Vulnerabilities leave businesses and individuals subject to a wide range ...
David Discenza
Four Ways to Improve Cybersecurity (Updated: December 9th, 2022 ) Cyber-attacks on businesses have become common place. In fact, it’s estimated that a cyber-attack occurs every 39 seconds. Who are the targets of these attacks? ...
Maxim Melamedov
Trouble is Brewing Cloud Paradise - 2023 Will Determine Company's Long-Term Plans for Cloud Use The relationship between developers and the cloud was practically love at first sight. For years, migration to the cloud in ...
Byod.png
David Fletcher Blown Image
Disaster Recovery Plan.png
Cloud For Dummies.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.