Business Transformation And The IT Journey

Business Transformation IT Journey

When we look at significant business model changes during the past thirty years, technology has often been at the core. From mainframes to mini-computers to microcomputers to client/server to the Internet – technology change has been a major driver for business change.

Today, while there are certainly new technologies, it’s the way we access and consume those technologies that provides a significant impact on our business and revenue models. In other words, the business value of technology has become the driver for business change.

We can see this most clearly when we look at what we’re calling the IT Transformation Journey and its impact on the business. As organizations change the way they access and consume technology, they have become more flexible and responsive to their industries and customers.

IT Transformation Journey

As the name implies, this journey is transformational, not really step-by-step. As I outline the six stages that Logicalis has identified, think of them as stepping stones on a path, rather than landing areas. Sometimes the path is quite serial, one step follows the next, but this is not always the case for every organization.

The first step of the journey for most companies is the use of component-based architectures in their data centers. This is a traditional IT consumption model – you purchase, maintain and add or upgrade technology as needed. But the model does not scale very well. Increases in compute, network or storage resources are handled separately and often by separate IT staffs. Requests for added storage often outweigh all other requests. And there is a great deal of either under-scoping or over-scoping what is required.

The next stepping stone in the journey is virtualization, where companies can begin to realize numerous benefits including the ability to reduce their data center footprint (overgrown in the last stage) and energy consumption, more quickly provision resources and improve manageability and uptime for applications. The impact on the business is to reduce IT costs and improve access to necessary IT infrastructure.

The third stepping stone in the journey is deploying converged infrastructure. Seamlessly integrating  compute/storage/networking technologies provides a flexible, agile and easier to deploy infrastructure by delivering the efficiency and business agility of virtualization and cloud computing.   These systems provide dynamic pools of resources that can be intelligently provisioned and managed which, in turn, provides the business the ability to speed delivery of IT resources to end-users and begin to consume technology in a more flexible, managed and automated fashion.

The next two steps have to do with protection – or disaster recovery – and automation and orchestration – or the ability to treat technology as a metered service. This provides a leaner, more secure and effective IT infrastructure that can be more easily aligned with business goals.

At the end (so far) of the IT Transformation Journey is the cloud. And, just like each step before it, the cloud combines earlier benefits and offers new opportunities. But unlike the other steps, cloud computing has a transformative effect on the business. It’s not about the technology anymore. Instead, it’s about the way the business can now operate.  The technology can be consumed as a service – as needed and on-demand. And it can be turned off just as quickly.

We believe that hybrid IT will continue to be the way that most businesses consume technology – using a combination of the different steps that have come before, as well as newer cloud technologies and delivery models. This will include some premises-based, some off-premises-based and cloud-based technologies.

Business can scale up or down quickly. New products can be launched, spun out or spun down less expensively. New markets can be entered more easily. The request for additional IT resources that formerly took multiple steps with multiple IT stakeholders over a period of multiple months, can now take minutes.

The cloud is fundamentally business-model based, while using enhanced technology at its core. Businesses using the power of the cloud change from the purchase economy to the subscription economy. In other words, organizations today can (finally) focus IT resources on how to build, expand and strengthen the business, rather than how to obtain, manage and pay for technology.

The IT Transformation Journey doesn’t have a specific beginning or ending. Different organizations, depending on their existing technology and maturity, are going to begin at different points. And there will certainly be a next generation of cloud services offering additional capabilities for business. But it is a path to a more agile way of doing business.

By Vince DeLuca, CEO, Logicalis US

Mr. DeLuca is responsible for all aspects of Logicalis US. He joined Logicalis in 2010 as the Chief Operating Officer responsible for the overall technology/strategy of Logicalis.

Vince brings a wealth of direct experience in Information Technology and Communication. Prior to Logicalis, Vince served as Senior Vice President for Wipro with responsibility for Infrastructure Practice Service Delivery and Client Engagement. 

Adam Cole
Mitigating Regulatory Risk Some of the great business opportunities for Unified Communications as a Service (UCaaS) integrators and Value-Added Resellers (VARs) have been the emergence of cloud, telephony and Unified Communications (UC) technologies such as ...
Gilad David Maayan
What Is SSPM? SaaS Security Posture Management (SSPM) is a set of security tools that an organization’s security team can use to gain visibility and manage security for their Software as a Service (SaaS) applications ...
Gilad David Maayan
Cloud Security Posture Management Cloud Security Posture Management (CSPM) enables you to secure cloud data and resources. You can integrate CSPM into your development process, to ensure continuous visibility. CSPM is particularly beneficial for DevOps ...
Episode 16: Bigger is not always better: the benefits of working with smaller cloud providers
The benefits of working with smaller cloud providers A conversation with Ryan Pollock, VP Product Marketing and Developer Relationships for Vultr.com - Everyone knows who the big players are in the cloud business. But sometimes, ...
Dana Gardner
Just as cloud computing initially seeped into organizations under the cloak of shadow IT, application programming interface (API) adoption has often followed an organic, inexact, and unaudited path. IT leaders know they’re benefiting from APIs -- ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.