Welcome!

@CloudExpo Authors: Zakia Bouachraoui, Elizabeth White, Liz McMillan, Pat Romanski, Roger Strukhoff

Related Topics: Open Source Cloud, @CloudExpo

Open Source Cloud: Article

Eleven Key Components of the Enterprise Cloud

Intelligent Design

Adaptivity at Cloud Expo

Here are the 11 key components that enable IT organizations to operationalize an enterprise cloud:

1. ECONOMIC MODEL

Define the business and IT linkage of demand and supply. Orient the analysis and model creations around the interactive dynamics of consumption of IT resources by the business and the fulfillment behavior of processing by IT. This needs to be correlated with the value-chain function and the corresponding products or services, differentiated by business type (liquidity, risk transference, advice), business importance (margin, labor, flow) and cost to transact.

2. DEMAND MAPPING

In natural language terms, define and capture the “day in the life of the business” — what it expects and where there are problems. Be sure to understand sensitivities to cost, bottlenecks and timing constraints — in particular, the quality attributes and operational requirements of the business in terms of calendar events, demographics and competitive benchmarks across the straight-throughprocessing (STP) value chain.

3. CONSUMPTION MANAGEMENT

Instrument and capture objective factual data on which users, accessing which applications, consume which server, network, application and storage resources and for how long. In particular, ensure that end-to-end delivery is correlated against consumption measures of latency, availability, throughput, data aggregation and persistence, disk swapping, memory volatility and coherence, compute time, event size, and I/O time.

4. BUSINESS POLICY AND IT SECURITY ENFORCEMENT

Ensure comprehensive, real-time business and security policy enforcement in bare-metal-speed time frames. The ability to implement point-of policy enforcement and administration that serves both business agility requirements with guaranteed, nonrepudiated transactions and secure data delivery creates a competitive advantage and significant efficiencies compared to traditional, regulatory-driven entitlement strategies.

5. DYNAMIC RUN-TIME ORCHESTRATION MANAGEMENT

Run-time control and execution enforcement means ensuring that the right work gets done at the right time with the right resources. Business operates dynamically in real time; your infrastructure needs to, as well. Think of infrastructure as a composition of service delivery units that can be consumed in a variable manner: on-demand consumption and on-demand reconfiguration.

6. CUSTOMIZABLE INFRASTRUCTURE FOOTPRINTS

As it executes across the digital supply chain, the trade life cycle experiences fluctuating volumes, frequency and workload types. Firms have to tailor the infrastructure service footprint to an ensemble of components and capabilities that can ensure optimal service delivery and efficiency for variable processing requirements in areas, including commerce, knowledge management and business operations.

7. UNIFIED FABRIC This eliminates the design limitations of relevant systems that are not connected in a way that provides the best performance and least amount of infrastructure. The unified fabric combines integrated infrastructure service footprints that encapsulate compute, memory, disk, I/O, storage and various processing appliances into a single footprint while incorporating quality of service, content acceleration, switching, routing and load balancing as needed. This drives speed, scale and cost efficiencies.

8. VIRTUAL INFRASTRUCTURE LIFECYCLE MANAGEMENT

Enable policy- and event-driven, bare-metal provisioning of infrastructure services that supplement dynamic peak transaction loads and near real-time provisioning of additional capacity on demand.

9. IMPLEMENT VIRTUAL RESOURCES

Once run-time management, resource management and instrumentation are in place, only then do you implement “everything virtual.” This is a critical lesson that traps most organizations where they start — bottom-up — without the ability to manage and ensure business alignment.

10. PRODUCT AND PORTFOLIO MANAGEMENT

Coalescing business and technical priorities in continuous capability adoption will ensure sustainment and differentiation of your business through IT.

11. SERVICE AND CHANGE MANAGEMENT

Dynamic models of operation require processes and procedures of service,

More Stories By Tony Bishop

Blueprint4IT is authored by a longtime IT and Datacenter Technologist. Author of Next Generation Datacenters in Financial Services – Driving Extreme Efficiency and Effective Cost Savings. A former technology executive for both Morgan Stanley and Wachovia Securities.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


CloudEXPO Stories
The precious oil is extracted from the seeds of prickly pear cactus plant. After taking out the seeds from the fruits, they are adequately dried and then cold pressed to obtain the oil. Indeed, the prickly seed oil is quite expensive. Well, that is understandable when you consider the fact that the seeds are really tiny and each seed contain only about 5% of oil in it at most, plus the seeds are usually handpicked from the fruits. This means it will take tons of these seeds to produce just one bottle of the oil for commercial purpose. But from its medical properties to its culinary importance, skin lightening, moisturizing, and protection abilities, down to its extraordinary hair care properties, prickly seed oil has got lots of excellent rewards for anyone who pays the price.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
ScaleMP is presenting at CloudEXPO 2019, held June 24-26 in Santa Clara, and we’d love to see you there. At the conference, we’ll demonstrate how ScaleMP is solving one of the most vexing challenges for cloud — memory cost and limit of scale — and how our innovative vSMP MemoryONE solution provides affordable larger server memory for the private and public cloud. Please visit us at Booth No. 519 to connect with our experts and learn more about vSMP MemoryONE and how it is already serving some of the world’s largest data centers. Click here to schedule a meeting with our experts and executives.
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understanding as the environment changes.