|By Tony Bishop||
|May 17, 2011 06:45 AM EDT||
This is part 3 of the continuing article "From Legacy to the Cloud: Next Generation Datacenters"
Restating the obvious - Business and IT have planned, designed and operated business systems in a silo-oriented manner with disconnected decisions and actions as to how the business needs to executes and systems are created, implemented and actually operate.
In the first two articles in this series I provided details as to the problems with legacy datacenter models & started laying out a proven method to attack the legacy problems by implementing a day in the life approach to get the truth of what is happening from the business to the datacenter and/or what decisions and actions have been taken to cause the day in the life to not execute as expected.
This article will focus on the ALIGNMENT Step of the four-step strategy for attacking legacy IT will be described.
Insight - ‘day in the life' understanding of both business and IT in terms of execution, historical decisions and actions and objective understanding of the actual situation as it exists today.
Alignment - creating a common language, taxonomy and system creation model to produce repeatable results.
Control - specific actions, tooling, process and approach to ensure the appropriate change occurs and re-occurs successfully.
Sustainment - mechanisms and processes instituted in a repeatable discipline to ensure consistent results and avoid falling back into the legacy traps.
Step 2 - Alignment
Recap from Step 1
In Step 1, we gathered day in the life information on an end-to-end basis. We hit on the key linkages of a business value chain tied to an IT supply chain. By profiling, mapping, modeling and correlating in an objective data driven manner - we now have assembled the input data to our alignment-processing step. In particular, we hit on four key actions of data collection that will not only serve in the transformation process but must become part of a sustainment process to ensure continual alignment between business and IT going forward.
The four key data principles are:
- "Know how you make money"
- "Know what fulfills your money making process"
- "Know your IT supply chain components & usage"
- "Know who & how you operate your IT supply chain"
Organizations who have been successful in migrating legacy datacenter infrastructures to next generation cloud like models have employed and adopted a critical strategy of "Systems Thinking".
Wikipedia Definition- Systems Thinking has been defined as an approach to problem solving, by viewing "problems" as parts of an overall system. In organizations, systems consist of people, structures and processes that work together to make an organization healthy or unhealthy. Systems thinking is not one thing but a set of habits or practices within a framework that is based on the belief that the component parts of a system can best understood in the context of relationships with each other and with other systems, rather than in isolation.
If we go back to the problem I covered in the first blog - most organizations (who are the ones with extreme legacy infrastructure problems) have not planned, design or created their specific applications and infrastructure systems with a strategic "System-Thinking" approach. Systems Thinking is ‘the' key or missing component to creating a successful formula that ensures alignment between Business and IT on the journey to the next generation datacenter in the cloud. That formula is defined below.
Alignment Formula - Insight Data Points + Systems Thinking + 80/20 Rule + Capability Oriented Taxonomy.
Insight Data Points - create the inputs and boundaries for decision-making. These data inputs are qualification & quantification of: Business Drivers X Business Behaviors x Key Performance Indicators by Business Function x Business Value Chain x Workload Qualities x Business Events x IT Supply Chain Qualities & Behaviors.
Systems Thinking - is the framework for the design decision-making process. Holistic end to end, top to bottom design thought process from business user to IT Rack on specific floor space with specific power distribution, cabling and cooling strategy translating to stated quality of execution required - i.e. Performance, cost, agility, availability, fungability, etc...
80/20 Rule - a critical method to get around scope creep and paralysis/analysis. With proper Insight data gathering that captures business behaviors profiled and trended correlated with IT supply chain behaviors (again think day in the life) there becomes a portfolio profile where 20% of the business functions consume close to 80% of the IT supply chain on a normalized basis. Typically these are client functions, revenue functions, regulatory functions and business risk related functions. Attack anything new in these functions with next generation strategy. Quarantine any legacy that is not fitting this profile and modernize any existing systems that fit the profile.
Capabilities Oriented Taxonomy - build it, buy it, borrow it - but establish a common taxonomy that Business and IT must think and speak. What are the business capabilities that generate revenue, the require IT supply chain capabilities to capture data, analyze or process the data, share information or content, update information or content and store the various information or content in a day in the life? This is critical to keep everyone aligned and create an environment of collaborative innovation. (Hint - borrow from Six Sigma, LEAN, SOA, EA, ISO, etc... that takes you from user to datacenter facilities. If you don't have a repository nearing 1000 discrete categories you probably have an incomplete taxonomy.)
Note - this is an iterative process where firms must crawl, walk, run in terms of defining and building out. Key is to get classification, definition and behavior of speaking and thinking in this manner between Business and IT that is critical.
Tooling & Approach
This formula needs to be implemented in a structured and well-managed manner. A transformation office should be established that incorporates Business and IT resources allocated/dedicated.
Getting started organizations need to create their library. This library needs to incorporate the Day in the Life Modeling & Profiling, Inventory of Business Systems Deployment Attributes and Interdependencies Profiled.
Organizations need to establish a Portfolio Decision Matrix that maintains all decisions and actions agreed to business and IT when applying the Alignment Formula.
A Technology Product Catalogue needs to be created/refined in a manner that is capability oriented and gaps identified. This is the master artifact for which the IT Supply Chain will be transformed against/measured against/benchmarked against.
A roadmap needs to be created of current state to target state systems & supply chain evolution by capability. When creating think of peeling an onion. Each layer has a purpose. In this case, each layer of the roadmap needs to communicate to each audience member.
Day in the Life Modeling needs to be translated into various Use Cases (Business functionality to technical enablement). These use cases need to be mapped to patterns (business and data patterns to application and workload patterns). The patterns then need to map to capability deployment strategies (how logical patterns will manifest themselves into physical realities). The key here is to use this modeling & translation effort as your CHANGE VEHICLE that ensures actions realize the alignment decisions made.
Next organizations must establish an engineering deployment model discipline. Here the translated output defined in the day in the life modeling above needs to be incorporated into IT supply chain engineering deployment that is linked to automation assembly and discrete policies for enactment.
The final tooling and process component is a communication strategy that incorporates methods, frequencies and playbooks tuned to your specific organization learning culture. Here, you must figure out how to use concepts like town-halls, executive briefings, status/progress reports, decision arbitration board, and detailed playbooks (think yellow book guide for dummies) that outline the steps being taken, decisions made/to be made, achievements accomplished and why things are being done or not.
If you are still reading at this point - you are ready to transform! The Next step that will be covered in the next article is to outline the processes and tooling is necessary to "control" and effect the change to your next generation datacenter.
In an era of historic innovation fueled by unprecedented access to data and technology, the low cost and risk of entering new markets has leveled the playing field for business. Today, any ambitious innovator can easily introduce a new application or product that can reinvent business models and transform the client experience. In their Day 2 Keynote at 19th Cloud Expo, Mercer Rowe, IBM Vice President of Strategic Alliances, and Raejeanne Skillern, Intel Vice President of Data Center Group and ...
Oct. 28, 2016 01:45 PM EDT Reads: 1,714
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Oct. 28, 2016 01:30 PM EDT Reads: 5,161
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 28, 2016 01:15 PM EDT Reads: 8,649
In the 21st century, security on the Internet has become one of the most important issues. We hear more and more about cyber-attacks on the websites of large corporations, banks and even small businesses. When online we’re concerned not only for our own safety but also our privacy. We have to know that hackers usually start their preparation by investigating the private information of admins – the habits, interests, visited websites and so on. On the other hand, our own security is in danger bec...
Oct. 28, 2016 01:15 PM EDT Reads: 740
"We've discovered that after shows 80% if leads that people get, 80% of the conversations end up on the show floor, meaning people forget about it, people forget who they talk to, people forget that there are actual business opportunities to be had here so we try to help out and keep the conversations going," explained Jeff Mesnik, Founder and President of ContentMX, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Oct. 28, 2016 01:00 PM EDT Reads: 3,719
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Oct. 28, 2016 01:00 PM EDT Reads: 2,403
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
Oct. 28, 2016 01:00 PM EDT Reads: 781
[session] Empowering Enterprise Security with the IoT By @SecureChannels | @ThingsExpo #IoT #IIoT #M2M #API
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
Oct. 28, 2016 12:52 PM EDT Reads: 190
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
Oct. 28, 2016 12:45 PM EDT Reads: 739
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Oct. 28, 2016 12:30 PM EDT Reads: 630
[session] Bert Loomis and AI in the Cloud By @IBMCloud | @CloudExpo #AI #Cloud #DigitalTransformation
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, will discuss the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They will also review two "free infrastruct...
Oct. 28, 2016 12:30 PM EDT Reads: 285
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
Oct. 28, 2016 12:15 PM EDT Reads: 1,301
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Oct. 28, 2016 12:02 PM EDT Reads: 237
As companies adopt the cloud-to-streamline workflow, deployment hasn’t been very seamless because of IT concerns surrounding security risks. The cloud offers many benefits, but protecting and securing information can be tricky across multiple cloud providers and remains IT’s overall responsibility. In his session at 19th Cloud Expo, Simon Bain, CEO of SearchYourCloud, will address security compliance issues associated with cloud applications and how document-level encryption is critical for sup...
Oct. 28, 2016 12:00 PM EDT Reads: 440
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...
Oct. 28, 2016 12:00 PM EDT Reads: 1,236
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will present at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they manag...
Oct. 28, 2016 12:00 PM EDT Reads: 3,691
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
Oct. 28, 2016 12:00 PM EDT Reads: 945
Join IBM November 2 at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA, and learn how to go beyond multi-speed it to bring agility to traditional enterprise applications. Technology innovation is the driving force behind modern business and enterprises must respond by increasing the speed and efficiency of software delivery. The challenge is that existing enterprise applications are expensive to develop and difficult to modernize. This often results in what Gartner calls...
Oct. 28, 2016 11:30 AM EDT Reads: 296
We are always online. We access our data, our finances, work, and various services on the Internet. But we live in a congested world of information in which the roads were built two decades ago. The quest for better, faster Internet routing has been around for a decade, but nobody solved this problem. We’ve seen band aid approaches like CDNs that attack a niche's slice of static content part of the Internet, but that’s it. It does not address the dynamic services-based Internet of today. It doe...
Oct. 28, 2016 11:30 AM EDT Reads: 2,112
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Oct. 28, 2016 11:00 AM EDT Reads: 367