Digital Transformation Driven by ITaaS

OMG Cloud Standards Summit

By G C Network | July 2, 2009

July 13-15, 2009, in Arlington, VA, the Object Management Group, is holding a Standards in Government & NGO’s Workshop. During the first day, the Cloud Computing Standards Summit will focus…

NDU IRM Cloud Computing Event “Sold Out”!!!

By G C Network | July 2, 2009

Hope you’ve already registered for the “The Cloud Computing Symposium” , Wednesday, July 15, 2009 at the National Defense University in Washington, DC! This promises to be the premier government…

SSA’s Jim Borland on Healthcare Information Technology

By G C Network | June 25, 2009

Today, on this week’s Federal News Radio Federal Executive Forum webcast, Mr. Jim Borland, Special Advisor for Health IT, Office of the Commissioner, Social Security Administration(SSA), will discuss the value…

Dr. Leslie Lenert of CDC Speaks on Healthcare IT

By G C Network | June 24, 2009

During this week’s Federal News Radio Federal Executive Forum pre-recording, Dr. Leslie Lenert, Director, National Center for Public Health Informatics (NCPHI) at the Centers for Disease Control and Prevention (CDC),…

Linda Fischetti on VHA Healthcare

By G C Network | June 23, 2009

This week pre-recording of Federal News Radio Federal Executive Forum featured Linda Fischetti , Health Informatics Architect at the Veterans Health Administration (VHA). During a panel discussion, her comments on…

Vish Sankaran, HHS, Speaks on Healthcare IT

By G C Network | June 22, 2009

During the pre-recording of this weeks Federal News Radio Federal Executive Forum, Vish Sankaran, Program Director of Federal Health Architecture, discussed the role of information technology in improving the country’s…

Iranian Protests Showcase Twitter, Facebook, YouTube (and Cloud Computing) !

By G C Network | June 21, 2009

In covering unfolding events in Iran, the world’s most powerful news outlets have been entirely dependent on the Twitter-provided flow of text, images, and video. While this has definitely showcased…

Two Days with AWS Federal

By G C Network | June 18, 2009

Today, I start two days of training with Amazon Web Services (AWS) Federal. If that’s the first time you’ve ever heard about an AWS Federal division, your not alone. Held…

Maneuver Warfare in IT: A Cheerleading Pundit

By G C Network | June 15, 2009

The Twitter conversation between Christofer Hoff and I went like this: Christofer – I haven’t formally blogged a resp. (yet) to @Kevin_Jackson on his ‘maneuver warfare in IT’ Not just a cultural shift but a…

Expanding Maneuver Warfare in IT

By G C Network | June 12, 2009

Earlier this week I published “Cloud Computing: The Dawn of Maneuver Warfare in IT Security” via Ulitzer. In publishing the article my intent was to explore the more dynamic approach…

Photo credit: Shutterstock

 

When executing an effective digital transformation strategy, management is tasked with placing the right workload into the most appropriate IT environment. This represents a shift from buying parts for self-assembly to composing services through self-serve consumption and pay-per-use models.  Quite often this transition also leads to the adoption of software defined environments across the enterprise infrastructure.

 

Software defined infrastructures do, however, bring with them some very unique challenges. Many of the most prevalent issues are centered around the relatively immature state of the technology itself. The most significant aspect of this challenge is the lack of industry standards for device control. Control software must know the status of all network devices and trunks, no matter what vendor equipment is being used. While OpenFlowstands today as the de facto software defined networking standard, it is a unidirectional forwarding-table update protocol that cannot be used to determine device status. It also doesn’t allow for the programming of port or trunk interfaces. A second critical issue is the lack of business process or enterprise IT policy definition capabilities.  This shortfall often leads to resource over provisioning caused by automation rules that deploy “just in case” instead of “just in time”.
When taken together, the two latter problems heighten the risk of vendor lock-in. This issue was highlighted last year by Major General Sarah Zabel, Vice Director of the Defense Information Systems Agency.  This military organization deals with 2,400 trouble calls, 2,000 tickets, 22,000 changes, and 36 cybersecurity incidents every day. Its global network interfaces with owned and managed networks from other military departments and services providers. When addressing the Open Networking User Group,Major General Zabel stated that the agency suffered from vendor lock-in and too many devices.
“We need an area where vendors accept the fact we need a path away from their solution…We need less dependence on hardware and to be able to work with more software.”
Another important but widely ignored challenge is the need to build organizational buy-in, a problem that is often accompanied by business process changes. According to Neal Secher, managing director and head of network architecture at BNY Mellon, “You need to partner with your business and show them the value. There’s a snowball [effect] that will add value and allow you to add more automation. You need to prove through evidence that it works and won’t hurt the business.”
Understanding how to select, configure and operate within this new paradigm requires new technology, new technical skillsets and new management techniques. This trifecta of change cannot be easily assimilated within most large organizations. This is why IBM IT-as-a-Service (ITaaS) can often provide critical advice, assistance and technology.
ITaaS is an approach for defining and consuming digital services through a hybrid cloud infrastructure. This approach has often shown itself as the most cost effective path toward workload optimization. When used as part of a holistic strategy, hybrid cloud infrastructures can deliver multiple levels of value by:
  • Delivering programmable, virtualized and application-centric networking capability;
  • Managing the corporate mobile infrastructure and Bring-Your-Own-Device (BYOD) initiatives;
  • Modernizing and optimizing the IT security program for identity, application, data, network, and endpoint security in a way that manages risk and achieves compliance; and
  • Enabling a shift of executive focus from infrastructure maintenance towards the creation of innovative products and services.

 

Hybrid cloud environment alone, however, aren’t able to maximize the value of digital transformation.  To do that you may also need to consider cloud brokerage capability.  This tool can be used to plan, procure, govern and manage all IT services across all cloud models. To avoid vendor lock-in, this service can also be exercised across multiple IT service providers.

 

Software defined infrastructures can deliver infrastructure optimization and enhanced IT services at a reduced cost. Organizations that opt to take advantage of this new operational model should, however, seriously consider taking the ITaaS route.

 

This post was brought to you by IBM Global Technology Services. For more content like this, visit ITBizAdvisor.

 

Cloud Musings
( Thank you. If you enjoyed this article, get free updates by email or RSS – © Copyright Kevin L. Jackson 2017)

 

Follow me at https://Twitter.com/Kevin_Jackson
Posted in

G C Network