SlideShare una empresa de Scribd logo
1 de 13
Move your Data Center to the Cloud
Case Study Analysis
November 2012
                                     MRIS Confidential and Proprietary
Agenda

     The way and where we were and how far we have come…

     The Promise of the Cloud and the Pitch

     Brief Background on MRIS and How We Got Here

     Your domain = the cloud domain – consider your new domains

     Change and Shift in Paradigm

     The Analysis

     Discussion


                                2                    MRIS Confidential and Proprietary
The Way We Were

   Back in 2001 we had:
       Slow broadband

       Very little WIFI

       No iPhones, smartphones, no tablets, no 4G

       No Twitter or Facebook

       Only half dozen “programs” on the typical PC

       The “Cloud” was part of a network diagram


                                  3                    MRIS Confidential and Proprietary
How far we have come…
Video, Photo, Media, Open Source, Mobility, BYOD, Big Data




                                                    The Shadow




                            4                  MRIS Confidential and Proprietary
The Promise and The Pitch

     Economics
        “Lower cost, transition from CAPX to OPX, and low initial outlay, data
         center costs, etc.”

     Flexibility
         “Ability to scale up and down rapidly based on needs. You don’t have
          to build enough infrastructure for peak load, just have bur$table
          capacity”

     Breakdown Technology Asset Boundaries
        “Start to break down silos between memory, CPU, storage, and
         network, and treat them all as resources, ties in to flexibility

     Focus
        “IT can focus on business applications and purposes, instead of
         commoditized maintenance which takes up to 80% of their time”


                                     5                        MRIS Confidential and Proprietary
MRIS and How We Got Here

     Brief Background on MRIS –

          Support for the cloud effort/analysis (C level, board,
           evangelist)

          Systems considered for the migration (MRIS systems)

          A 3 year history of those systems- vendor relationships,
           etc. (CS migration, floor space, etc.)




                                   6                    MRIS Confidential and Proprietary
Preparation for a Cloud Analysis

     Your domain = the cloud domain – consider your new
      domains

          The Homework Before the Work- Cloud Security Alliance
           Domains (all three sections below covered by our doc,
           include open source, open stack, POC’s, performance)

             Cloud Architecture

             Governing in the Cloud - OS

             Operating in the Cloud




                                            7       MRIS Confidential and Proprietary
The Change in Paradigm

     Change and Shift in
      Paradigm (working on
      solutions versus working on
      services, maintain expertise)

          What does this mean to
           people’s jobs? Shifting
           skillsets. And again,
           existing relationships.
           What does CIO mean
           again?



                                 8    MRIS Confidential and Proprietary
The Analysis – Our Personal Bar of Approaching Cloud Providers



      The Analysis

           How to look at the opportunity clearly and what to
            analyze - our approach




                                  9                    MRIS Confidential and Proprietary
The Analysis                                             Item                                                          Relevance
                       *****BUFFER                                                                                   You need a BUFFER
                       *****CSP Skillset based on your needs                                           OS (DR), difficulty in deployment, architecture
                       *****CSP Understanding of your Environment                                                 This one will surprise you
There is a lot to      *****DC Floor Space                                                                       Current contracts and costs
                       *****Equipment Management - Server, NW, Storage                                     Current contracts, existing relationships
consider in your       *****OS Management                                                                       Updates, tiers of management
analysis. All these    *****Replication and backups                                       Point to Point, Distance, Means of Replication, CSP Skillset, 30% of CIO’s
                       *****Servers Architecture/Manufacturer                                                      High risk changes (POC)
line items require a   *****Shared or Private or Hybrid Based on Performance needs and
comparison of your     Virtualization Boundaries                                                                 Virtualization Boundaries
                       *****SLA, Contract, Terms, Termination                                   Adding systems, removing systems, your access to systems
current                *****Storage Architecture/Manufacturer                                                     High risk changes (POC)
environment to that    *****Who is providing you the support?                                                      Third party or the CSP
                       Application management                                                     CSP skillset, ability and willingness, current contracts
of the cloud service   CSP Financials                                                                    Where will they be in 18, 24, 36 months
provider.              CSP Partnerships                                                                          VAR's, Manufacturers, etc.
                       CSP Reputation                                                    Check around, find current customers you know, don’t settle on references
                       Current Licensing Costs V Cloud                                                         VM, SSL, OS, DB, Malware, ASL
A lot of leg work is   Data Center Locations                                                              Geographically dispersed, access for staff
required for current   Database Architecture                                                                      Virtualization Boundaries!
                       Database Management                                                         CSP skillset, ability and willingness, current contracts
contract costs and     DISASTER RECOVERY                                                                         Where is your recovery site?
terms, lease           Equipment Ownership - Server, NW, Storage                                   Current Leases, their termination dates, overall cost
                       Global Load Balancing                                                                So there is DR - how do you get to it?
expiration,
                       HW Refresh Guarantee?                                                  Current leases. Need for refresh and performance, extra costs?
bandwidth costs,                                                                            Does the CSP offer what you need to accomplish fault tolerance and
etc.                   Load Balancing                                                                                   redundancy
                       Monitoring                                                                        Application, Circuit, System - Notification
                       Network Architecture/Manufacturer                                                          High risk changes (POC)
We’ve selected a       One-time setup fees                                                          CSP, your app vendors, your staff, travel expenses
few to give you our    Performance Needs                                                     Level of Performance, Bursts, consistent usage? Can it be shared
                       POC? Costs? Recovery of cost?                                                                 POC!, POC, POC!
insight approach       Power /Ping and Pipe - HQ                                                        Between sites and your offices/data centers
and outcome on.        Power/Ping and Pipe - Hosting                                            Current contracts, their cost, durations, capable of bursts
                       SSL Management                                                                Related to NW, CSP skillset, ability and willingness
                       What about your staff                                                What about all your other solutions, what about in-house expertise
                       YOUR GUT
                                                                        10                                               MRIS Confidential and Proprietary
Outcome of analysis – 3 years




                      11        MRIS Confidential and Proprietary
Back to the Promise – Pros and Cons
    A comprehensive analysis of your needs in a cloud solution will enlighten your teams on the
   potential of cloud computing for your enterprise, understand the strengths that you have built
                   in your solutions and uncover weaknesses that may be present.
                    Know who you are – the CSP’s may not (small, medium, large)

     Economics
           “Lower cost, transition from CAPX to OPX, and low initial outlay, data center costs, etc.”

     Flexibility
           “Ability to scale up and down rapidly based on needs. You don’t have to build enough
            infrastructure for peak load, just have bur$table capacity”

     Breakdown Technology Asset Boundaries
           “Start to break down silos between memory, CPU, storage, and network, and treat them all
            as resources, ties in to flexibility

     Focus
           IT can focus on business applications and purposes, instead of commoditized maintenance
            which takes up to 80% of their time




                                                 12                                 MRIS Confidential and Proprietary
Discussion




             13   MRIS Confidential and Proprietary

Más contenido relacionado

La actualidad más candente

Distributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLADistributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLAAngelo Corsaro
 
Patterns of Data Distribution
Patterns of Data DistributionPatterns of Data Distribution
Patterns of Data DistributionRick Warren
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...CloudOps Summit
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderNovell
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Novell
 
2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_optEdda Kang
 
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdfOracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdfInSync2011
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeSumant Tambe
 
Terremark Virtualized Dr Custom Storage Pre Press
Terremark Virtualized Dr Custom Storage Pre PressTerremark Virtualized Dr Custom Storage Pre Press
Terremark Virtualized Dr Custom Storage Pre PressFrank Johnson
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...Novell
 
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...BTI Systems
 
Virtualisatie In Het NGDC - Marc Janssen
Virtualisatie In Het NGDC - Marc JanssenVirtualisatie In Het NGDC - Marc Janssen
Virtualisatie In Het NGDC - Marc JanssenHPDutchWorld
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandDamian Hamilton
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs EliteJon G. Hall
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...CA API Management
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemClovis Chapman
 
Stott May Presentation
Stott May PresentationStott May Presentation
Stott May Presentationcaoimheos
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...GovCloud Network
 

La actualidad más candente (20)

Distributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLADistributed Simulations with DDS and HLA
Distributed Simulations with DDS and HLA
 
Patterns of Data Distribution
Patterns of Data DistributionPatterns of Data Distribution
Patterns of Data Distribution
 
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
Cloud architecture and deployment: The Kognitio checklist, Nigel Sanctuary, K...
 
What an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud ProviderWhat an Enterprise Should Look for in a Cloud Provider
What an Enterprise Should Look for in a Cloud Provider
 
Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...Implementing Process Controls and Risk Management with Novell Compliance Mana...
Implementing Process Controls and Risk Management with Novell Compliance Mana...
 
2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt2 25008 domain_ten11.29.12_v2_opt
2 25008 domain_ten11.29.12_v2_opt
 
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdfOracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
Oracle Systems _ Kevin Mcisaac _ The IT Landscape has changes - have you_.pdf
 
Communication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/SubscribeCommunication Patterns Using Data-Centric Publish/Subscribe
Communication Patterns Using Data-Centric Publish/Subscribe
 
Terremark Virtualized Dr Custom Storage Pre Press
Terremark Virtualized Dr Custom Storage Pre PressTerremark Virtualized Dr Custom Storage Pre Press
Terremark Virtualized Dr Custom Storage Pre Press
 
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
 
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...
Webinar: Learn How To Deploy High-Scale, Low-Latency Cost-Efficient Solutions...
 
Virtualisatie In Het NGDC - Marc Janssen
Virtualisatie In Het NGDC - Marc JanssenVirtualisatie In Het NGDC - Marc Janssen
Virtualisatie In Het NGDC - Marc Janssen
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New Zealand
 
Deadly Sins Bcs Elite
Deadly Sins Bcs EliteDeadly Sins Bcs Elite
Deadly Sins Bcs Elite
 
The SDN Opportunity
The SDN OpportunityThe SDN Opportunity
The SDN Opportunity
 
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
Security & Governance for the Cloud: a Savvis Case Study (Presented at Cloud ...
 
Towards a Federated Cloud Ecosystem
Towards a Federated Cloud EcosystemTowards a Federated Cloud Ecosystem
Towards a Federated Cloud Ecosystem
 
Stott May Presentation
Stott May PresentationStott May Presentation
Stott May Presentation
 
Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...Kevin jackson cloud service brokerage for datacenter service providers for we...
Kevin jackson cloud service brokerage for datacenter service providers for we...
 
Programmable WAN Networking is SFW
Programmable WAN Networking is SFWProgrammable WAN Networking is SFW
Programmable WAN Networking is SFW
 

Destacado

How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyVISIHOSTING
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center TransformationArraya Solutions
 
Data Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderData Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderHostway|HOSTING
 
Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy successInternap
 
The Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyThe Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyVISIHOSTING
 
Data Center Consolidation Services
Data Center Consolidation ServicesData Center Consolidation Services
Data Center Consolidation ServicesInfosys
 
10 Steps to Data Center Infrastructure Management Success
10 Steps to Data Center Infrastructure Management Success10 Steps to Data Center Infrastructure Management Success
10 Steps to Data Center Infrastructure Management SuccessRaritan
 
Moodle Webinar presentation
Moodle Webinar presentationMoodle Webinar presentation
Moodle Webinar presentationGavin Henrick
 
Cloud vs.data center
Cloud vs.data centerCloud vs.data center
Cloud vs.data centerAPEX Global
 
Data Center Transformation Summit
Data Center Transformation SummitData Center Transformation Summit
Data Center Transformation SummitVincent3000
 
Data Center Migration Forklift
Data Center Migration ForkliftData Center Migration Forklift
Data Center Migration Forkliftdon4591
 
IBM consolidation and relocation webinar
IBM consolidation and relocation webinarIBM consolidation and relocation webinar
IBM consolidation and relocation webinarHerb Hernandez
 
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...Capgemini
 

Destacado (16)

How to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT StrategyHow to Utilize Cloud in Your Corporate IT Strategy
How to Utilize Cloud in Your Corporate IT Strategy
 
Fdr first inaugural address
Fdr   first inaugural addressFdr   first inaugural address
Fdr first inaugural address
 
Data Center Transformation
Data Center TransformationData Center Transformation
Data Center Transformation
 
Data Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation ProviderData Center 101: What to Look for in a Colocation Provider
Data Center 101: What to Look for in a Colocation Provider
 
Top 10 data center strategy success
Top 10 data center strategy successTop 10 data center strategy success
Top 10 data center strategy success
 
The Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center StrategyThe Role of Cloud Computing In Your Data Center Strategy
The Role of Cloud Computing In Your Data Center Strategy
 
Data Center Consolidation Services
Data Center Consolidation ServicesData Center Consolidation Services
Data Center Consolidation Services
 
10 Steps to Data Center Infrastructure Management Success
10 Steps to Data Center Infrastructure Management Success10 Steps to Data Center Infrastructure Management Success
10 Steps to Data Center Infrastructure Management Success
 
Moodle Webinar presentation
Moodle Webinar presentationMoodle Webinar presentation
Moodle Webinar presentation
 
Cloud vs.data center
Cloud vs.data centerCloud vs.data center
Cloud vs.data center
 
Data Center Optimization Best Practices
Data Center Optimization Best PracticesData Center Optimization Best Practices
Data Center Optimization Best Practices
 
Top Ten Data Center Predictions for 2016
Top Ten Data Center Predictions for 2016Top Ten Data Center Predictions for 2016
Top Ten Data Center Predictions for 2016
 
Data Center Transformation Summit
Data Center Transformation SummitData Center Transformation Summit
Data Center Transformation Summit
 
Data Center Migration Forklift
Data Center Migration ForkliftData Center Migration Forklift
Data Center Migration Forklift
 
IBM consolidation and relocation webinar
IBM consolidation and relocation webinarIBM consolidation and relocation webinar
IBM consolidation and relocation webinar
 
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...
Data Center Consolidation and Optimization By Magnus Manders, CTO of Infrastr...
 

Similar a Move your Data Center to the Cloud

Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdf
Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdfOracle Systems _ Kevin McIsaac _The IT landscape has changed.pdf
Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdfInSync2011
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...IndicThreads
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...IndicThreads
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft PresentationAVEVA
 
Cloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesCloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesPrasad Chitta
 
Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2종필 김
 
Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333종필 김
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOpenStorageSummit
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasySamantha James
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the CloudSpiceworks
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesCloudPassage
 
Selecting csp iapp_summit_2012 - 5-february
Selecting csp iapp_summit_2012 - 5-februarySelecting csp iapp_summit_2012 - 5-february
Selecting csp iapp_summit_2012 - 5-februaryscm24
 
ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedJazz Yao-Tsung Wang
 
Cloudy with a chance of arm
Cloudy with a chance of armCloudy with a chance of arm
Cloudy with a chance of armStephan Cadene
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Zuora, Inc.
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computingikanow
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud ComputingKarthik Sankar
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenJohn Rhoton
 

Similar a Move your Data Center to the Cloud (20)

Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdf
Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdfOracle Systems _ Kevin McIsaac _The IT landscape has changed.pdf
Oracle Systems _ Kevin McIsaac _The IT landscape has changed.pdf
 
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...Cloud Lock-in vs. Cloud Interoperability  - Indicthreads cloud computing conf...
Cloud Lock-in vs. Cloud Interoperability - Indicthreads cloud computing conf...
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
Cloud lockin and interoperability v2   indic threads cloud computing conferen...Cloud lockin and interoperability v2   indic threads cloud computing conferen...
Cloud lockin and interoperability v2 indic threads cloud computing conferen...
 
Gef 2012 InduSoft Presentation
Gef 2012  InduSoft PresentationGef 2012  InduSoft Presentation
Gef 2012 InduSoft Presentation
 
Cloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & ChallengesCloud Computing - Foundations, Perspectives & Challenges
Cloud Computing - Foundations, Perspectives & Challenges
 
Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2Dr관련 세미나 자료 v2
Dr관련 세미나 자료 v2
 
Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333Dr관련 세미나 자료 v2333
Dr관련 세미나 자료 v2333
 
OSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal SternOSS Presentation Keynote by Hal Stern
OSS Presentation Keynote by Hal Stern
 
Cloud computing in south africa reality or fantasy
Cloud computing in south africa   reality or fantasyCloud computing in south africa   reality or fantasy
Cloud computing in south africa reality or fantasy
 
Making Sense of the Cloud
Making Sense of the CloudMaking Sense of the Cloud
Making Sense of the Cloud
 
What You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud GuidelinesWhat You Need To Know About The New PCI Cloud Guidelines
What You Need To Know About The New PCI Cloud Guidelines
 
Selecting csp iapp_summit_2012 - 5-february
Selecting csp iapp_summit_2012 - 5-februarySelecting csp iapp_summit_2012 - 5-february
Selecting csp iapp_summit_2012 - 5-february
 
ClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud TestbedClassCloud: switch your PC Classroom into Cloud Testbed
ClassCloud: switch your PC Classroom into Cloud Testbed
 
Cloudy with a chance of arm
Cloudy with a chance of armCloudy with a chance of arm
Cloudy with a chance of arm
 
Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)Usage Based Metering in the Cloud (Subscribed13)
Usage Based Metering in the Cloud (Subscribed13)
 
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud ComputingDr. Michael Valivullah, NASS/USDA - Cloud Computing
Dr. Michael Valivullah, NASS/USDA - Cloud Computing
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
Clearing the air on Cloud Computing
Clearing the air on Cloud ComputingClearing the air on Cloud Computing
Clearing the air on Cloud Computing
 
Cloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für GroßunternehmenCloud Computing: Hindernisse und Chancen für Großunternehmen
Cloud Computing: Hindernisse und Chancen für Großunternehmen
 

Más de RedZone Technologies

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone Technologies
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementRedZone Technologies
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...RedZone Technologies
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMRedZone Technologies
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipRedZone Technologies
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...RedZone Technologies
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...RedZone Technologies
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZone Technologies
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesRedZone Technologies
 
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)RedZone Technologies
 

Más de RedZone Technologies (13)

RedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and TransformationRedZone10X: innovation strategy leadership and Transformation
RedZone10X: innovation strategy leadership and Transformation
 
Corona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat ManagementCorona| COVID IT Tactical Security Preparedness: Threat Management
Corona| COVID IT Tactical Security Preparedness: Threat Management
 
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
Leadership, Bravery and Courage in Times of Instability and Fear: for CIOs an...
 
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEMModern Threat Architecture Landscape: How to Build an Actionable SIEM
Modern Threat Architecture Landscape: How to Build an Actionable SIEM
 
Enterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and LeadershipEnterprise IT Security| CIO Innovation and Leadership
Enterprise IT Security| CIO Innovation and Leadership
 
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
Presentation for the 2016 National and Chapter Leadership Conference by Bill ...
 
CIO Scoreboard Overview
CIO Scoreboard OverviewCIO Scoreboard Overview
CIO Scoreboard Overview
 
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
How to Communicate the Actual Readiness of your IT Security Program for PCI 3...
 
RedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile PresentationRedZoneCIO Security Scoreboard Profile Presentation
RedZoneCIO Security Scoreboard Profile Presentation
 
RedZone Testimonials
RedZone TestimonialsRedZone Testimonials
RedZone Testimonials
 
5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack5 Ways To Fight A DDoS Attack
5 Ways To Fight A DDoS Attack
 
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive SeriesMobile Device Management Policy Workshop Part 2 | CIO Executive Series
Mobile Device Management Policy Workshop Part 2 | CIO Executive Series
 
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
5 of 13 Ways To Prevent Advanced Persistent Threads (APTs)
 

Último

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Último (20)

Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Move your Data Center to the Cloud

  • 1. Move your Data Center to the Cloud Case Study Analysis November 2012 MRIS Confidential and Proprietary
  • 2. Agenda  The way and where we were and how far we have come…  The Promise of the Cloud and the Pitch  Brief Background on MRIS and How We Got Here  Your domain = the cloud domain – consider your new domains  Change and Shift in Paradigm  The Analysis  Discussion 2 MRIS Confidential and Proprietary
  • 3. The Way We Were  Back in 2001 we had:  Slow broadband  Very little WIFI  No iPhones, smartphones, no tablets, no 4G  No Twitter or Facebook  Only half dozen “programs” on the typical PC  The “Cloud” was part of a network diagram 3 MRIS Confidential and Proprietary
  • 4. How far we have come… Video, Photo, Media, Open Source, Mobility, BYOD, Big Data The Shadow 4 MRIS Confidential and Proprietary
  • 5. The Promise and The Pitch  Economics  “Lower cost, transition from CAPX to OPX, and low initial outlay, data center costs, etc.”  Flexibility  “Ability to scale up and down rapidly based on needs. You don’t have to build enough infrastructure for peak load, just have bur$table capacity”  Breakdown Technology Asset Boundaries  “Start to break down silos between memory, CPU, storage, and network, and treat them all as resources, ties in to flexibility  Focus  “IT can focus on business applications and purposes, instead of commoditized maintenance which takes up to 80% of their time” 5 MRIS Confidential and Proprietary
  • 6. MRIS and How We Got Here  Brief Background on MRIS –  Support for the cloud effort/analysis (C level, board, evangelist)  Systems considered for the migration (MRIS systems)  A 3 year history of those systems- vendor relationships, etc. (CS migration, floor space, etc.) 6 MRIS Confidential and Proprietary
  • 7. Preparation for a Cloud Analysis  Your domain = the cloud domain – consider your new domains  The Homework Before the Work- Cloud Security Alliance Domains (all three sections below covered by our doc, include open source, open stack, POC’s, performance)  Cloud Architecture  Governing in the Cloud - OS  Operating in the Cloud 7 MRIS Confidential and Proprietary
  • 8. The Change in Paradigm  Change and Shift in Paradigm (working on solutions versus working on services, maintain expertise)  What does this mean to people’s jobs? Shifting skillsets. And again, existing relationships. What does CIO mean again? 8 MRIS Confidential and Proprietary
  • 9. The Analysis – Our Personal Bar of Approaching Cloud Providers  The Analysis  How to look at the opportunity clearly and what to analyze - our approach 9 MRIS Confidential and Proprietary
  • 10. The Analysis Item Relevance *****BUFFER You need a BUFFER *****CSP Skillset based on your needs OS (DR), difficulty in deployment, architecture *****CSP Understanding of your Environment This one will surprise you There is a lot to *****DC Floor Space Current contracts and costs *****Equipment Management - Server, NW, Storage Current contracts, existing relationships consider in your *****OS Management Updates, tiers of management analysis. All these *****Replication and backups Point to Point, Distance, Means of Replication, CSP Skillset, 30% of CIO’s *****Servers Architecture/Manufacturer High risk changes (POC) line items require a *****Shared or Private or Hybrid Based on Performance needs and comparison of your Virtualization Boundaries Virtualization Boundaries *****SLA, Contract, Terms, Termination Adding systems, removing systems, your access to systems current *****Storage Architecture/Manufacturer High risk changes (POC) environment to that *****Who is providing you the support? Third party or the CSP Application management CSP skillset, ability and willingness, current contracts of the cloud service CSP Financials Where will they be in 18, 24, 36 months provider. CSP Partnerships VAR's, Manufacturers, etc. CSP Reputation Check around, find current customers you know, don’t settle on references Current Licensing Costs V Cloud VM, SSL, OS, DB, Malware, ASL A lot of leg work is Data Center Locations Geographically dispersed, access for staff required for current Database Architecture Virtualization Boundaries! Database Management CSP skillset, ability and willingness, current contracts contract costs and DISASTER RECOVERY Where is your recovery site? terms, lease Equipment Ownership - Server, NW, Storage Current Leases, their termination dates, overall cost Global Load Balancing So there is DR - how do you get to it? expiration, HW Refresh Guarantee? Current leases. Need for refresh and performance, extra costs? bandwidth costs, Does the CSP offer what you need to accomplish fault tolerance and etc. Load Balancing redundancy Monitoring Application, Circuit, System - Notification Network Architecture/Manufacturer High risk changes (POC) We’ve selected a One-time setup fees CSP, your app vendors, your staff, travel expenses few to give you our Performance Needs Level of Performance, Bursts, consistent usage? Can it be shared POC? Costs? Recovery of cost? POC!, POC, POC! insight approach Power /Ping and Pipe - HQ Between sites and your offices/data centers and outcome on. Power/Ping and Pipe - Hosting Current contracts, their cost, durations, capable of bursts SSL Management Related to NW, CSP skillset, ability and willingness What about your staff What about all your other solutions, what about in-house expertise YOUR GUT 10 MRIS Confidential and Proprietary
  • 11. Outcome of analysis – 3 years 11 MRIS Confidential and Proprietary
  • 12. Back to the Promise – Pros and Cons A comprehensive analysis of your needs in a cloud solution will enlighten your teams on the potential of cloud computing for your enterprise, understand the strengths that you have built in your solutions and uncover weaknesses that may be present. Know who you are – the CSP’s may not (small, medium, large)  Economics  “Lower cost, transition from CAPX to OPX, and low initial outlay, data center costs, etc.”  Flexibility  “Ability to scale up and down rapidly based on needs. You don’t have to build enough infrastructure for peak load, just have bur$table capacity”  Breakdown Technology Asset Boundaries  “Start to break down silos between memory, CPU, storage, and network, and treat them all as resources, ties in to flexibility  Focus  IT can focus on business applications and purposes, instead of commoditized maintenance which takes up to 80% of their time 12 MRIS Confidential and Proprietary
  • 13. Discussion 13 MRIS Confidential and Proprietary