Isn't it time for us to have a blueprint for IT?

Blueprint4IT

Subscribe to Blueprint4IT: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Blueprint4IT: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Blueprint4IT Authors: Lee Cullom, Jeremy Geelan, James Houghton, Elizabeth White, Tony Bishop

Related Topics: Cloud Computing, Cloud Data Analytics, Blueprint4IT

Blog Post

Private Clouds: Affords Enterprises Trust & Control While Creating Agility

Create and implement your execution blueprint for moving to the cloud

As the debate rages on regarding whether to cloud or not to cloud across enterprise IT, it is important for IT executives and strategists to keep in mind some of the following:

  • What other IT delivery fulfillment strategy is available today that when applied in a proper manner can enable IT to build agility and flexibility into the delivery paradigm while affording greater trust and control? The answer - a private cloud.
  • Trust and Control come when you have effective mechanisms, procedures, policies and processes. Legacy silos that have hard wired systems, hard-coded passwords, no service orchestration, along with lack of integrated virtualization and automation does not equate to trust and control.

A proper private cloud blueprint incorporates the necessary building blocks to optimize a legacy systems delivery model while incorporating trust and control mechanisms. It does this by adding key capabilities including:

  • Abstraction - top to bottom: workload, application, data, infrastructure creating points of management control and enforcement;
  • Runtime Service Orchestration - execution management of workload based on policy, runtime state and data migration regulations
  • Logical/Physical Enforcement Points - combined with abstraction a strategy incorporating appliances creating policy enforcement/admission points into cloud utility, across cloud utility and into data leveraging traditional authentication and authorization mechanisms.
  • Trusted Virtual Compute Pools - the ability to exploit internal infrastructure assets that provide firmware and hardware level validation of the abstracted virtual container(s) running on top of it.
  • Virtualization Lifecycle Management - policy based, on-demand creation, provisioning, validation, monitoring and retirement of virtual infrastructure components based on business calendar, wall clock, special events, etc.
  • Platform as a Service - an architectural and engineering strategy to rationalize application and infrastructure combinations based on workloads and standardized containers that can be assembled and torn down exploiting the technologies above.

If you're considering moving to a private cloud or have already started implementing a private cloud - you should consider two things:

  1. Have I created and/or implemented a blueprint for my firm that incorporates trust and control into the runtime by exploiting the capabilities listed above.
  2. Have I laid out a blueprint to management, architecture, engineering, security and audit that shows how adding the capabilities listed above provide greater control and trust in the infrastructure delivery model while adding agility into the equation.

Hopefully this helps you in creating and implementing your execution blueprint for moving to the cloud.

More Stories By Tony Bishop

Blueprint4IT is authored by a longtime IT and Datacenter Technologist. Author of Next Generation Datacenters in Financial Services – Driving Extreme Efficiency and Effective Cost Savings. A former technology executive for both Morgan Stanley and Wachovia Securities.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.