Cloudy Forecasts and Other Trends in Information Technology

Views:
 
     
 

Presentation Description

No description available.

Comments

Presentation Transcript

Cloudy Forecasts and Other Trends in Information Technology:

Cloudy Forecasts and Other Trends in Information Technology Alan McSweeney

Objectives:

January 9, 2011 2 Objectives To discuss the trend towards cloud computing in the context of current and past trends and forecasts in Information Technology

Agenda:

January 9, 2011 3 Agenda Cloud Computing IT Trends Cloud Adoption

Tired of Presentations from Vendors With Pictures of Clouds?:

January 9, 2011 4 Tired of Presentations from Vendors With Pictures of Clouds?

Cloud Computing as a Trend in Information Technology:

January 9, 2011 5 Cloud Computing as a Trend in Information Technology What are the sources of information technology trends Surveys by trade bodies of members Surveys by journals and publications Statements by analysts Statements by vendors Which are real trends and which represent wishful/fanciful thinking or biased? Which trends are relevant to your organisation, based on operating area, geography, size, state of adoption and use of IT? What happened to previous trends?

Cloud Definition:

January 9, 2011 6 Cloud Definition The use of a collection of services, applications, information and associated infrastructure consisting of pools of computing, networking and storage resources Components can be rapidly provisioned, implemented and decommissioned and scaled up or down providing for an on-demand utility-like model of allocation and consumption

What Use Are Trends?:

January 9, 2011 7 What Use Are Trends? To the business - what is likely to be able to generate revenue through additional sales, access to new markets or channels or save money To the IT function within an organisation – what new technologies can help in managing IT like a business and delivering value To suppliers of IT services - what customers will buy, where I should focus my sales effort, how I should restructure my products/services to be relevant, how I should invest in R&D

Business and IT Concerns Regarding Information Technology:

January 9, 2011 8 Business and IT Concerns Regarding Information Technology Business Processes Delivered by IT Systems Cost Continuity and Availability Training Competition Regulation Governance and Standards Business Partners Efficiency Business Alignment, Management and Control Cost, Budgeting, Planning Reliability, Continuity and Availability Personnel Training Technology Changes Vendors and Suppliers What Partners and Competitors Are Doing Technical Platforms of New Applications Business Information Technology Internal Focus External Focus

Relevance of Trends in Information Technology to Business and IT:

January 9, 2011 9 Relevance of Trends in Information Technology to Business and IT Will it Save Money? Will it Generate Money? Will Adoption of Trends Assist With Competition, Regulation and Governance? Will it Reduce IT Management Costs? Will it Improve IT Service Management? Will it Enable IT to be More Responsive? Will Existing Systems Be Rendered Obsolete and Unsupported? Business Information Technology Internal Focus External Focus

How Much of Trend Adoption Is Driven By?:

January 9, 2011 10 How Much of Trend Adoption Is Driven By? Everybody Else Is Doing It I Want To Do It So It Appears On My Resume I Like New Technology Vendors Keep Talking About It I Need One Good Idea To Stamp My Mark On The Organisation It Will Solve All My Problems Business Information Technology Internal Focus External Focus

Layered View of IT Infrastructure:

January 9, 2011 11 Layered View of IT Infrastructure Connection Communication Data Presentation, Data Security Applications, Systems and Business Processes Storage Media and Network Signals Storage and Network Addressing Network Transmission Layer 4 Layer 5 Layer 6 Layer 7 Layer 1 Layer 2 Layer 3 Operations, Usage, Management, Control, Governance Layer 8+ What the Business is Concerned With What IT is Concerned With

Information Technology Concerns:

January 9, 2011 12 Information Technology Concerns IT should concern itself with trends that Assist and improve its internal operations Improve the systems and service IT delivers to the business

Cloud Manifestations:

January 9, 2011 13 Cloud Manifestations Cloud Computing A business model for delivering IT as a service, referred to as IT as a service (ITaaS) Types of Cloud Private Cloud - behind firewall serving applications in their company Public Cloud – shared infrastructure, accessible to general customers with multiple tenants Manifestations of Cloud Computing IaaS - Infrastructure as a service PaaS - Platform as a service SaaS - Software as a service STaaS - Storage as a service BRaaS - Backup and recovery as a service EaaS - Everything as a Service

Cloud Manifestations:

January 9, 2011 14 Cloud Manifestations Is it all just a pain in the …aaS

What are the Issues Cloud Computing is Trying to Fix?:

January 9, 2011 15 What are the Issues Cloud Computing is Trying to Fix? Up to 85% of computing capacity is unused 54% growth in storage capacity every year 70% of IT budget on average is spent on maintaining current IT infrastructures rather than adding new capabilities How will cloud computing fix these issues?

Migration to Cloud:

January 9, 2011 16 Migration to Cloud Storage Servers Applications Network Traditional Application- Based Infrastructure (Partially) Virtualised Infrastructure Private (Internal) Cloud Public (Shared) Cloud Relatively Minor and Incremental Evolutions A Major Change

Migration to Cloud:

January 9, 2011 17 Migration to Cloud Virtualisation technology enables a shared and a type of service-oriented infrastructure Creates a pool of computing, storage and network resources that can be shared between applications Private cloud implementations are effectively more packaged versions of virtualisation technology created by vendors with additional management tools

Cloud Features and Potential Benefits:

January 9, 2011 18 Cloud Features and Potential Benefits Features Virtualised and standardised infrastructure Highly scalable (depending on the application Fault tolerant and highly reliable and available Fast application deployment Benefits Potential for simplified and more efficient IT and application management Deliver more applications to large number of users increased utilisation at reduced cost Faster reaction to business requirements

Analysis of Some Information Technology Trends:

January 9, 2011 19 Analysis of Some Information Technology Trends AICPA – Survey of members from 2001 to 2009 (2010 not published) on initiatives in IT that are of concern to their members Gartner – well known analyst company Two very different views of information technology trends

Gartner – Key IT Trends 2008 - 2010:

January 9, 2011 20 Gartner – Key IT Trends 2008 - 2010 2010 2009 2008 1 Cloud Computing Virtualisation Green IT 2 Advanced Analytics Cloud Computing Unified Communications 3 Client Computing Servers - Beyond Blades Business Process Modelling 4 IT for Green Web-Oriented Architectures Metadata Management 5 Reshaping the Data Centre Enterprise Mashups Virtualisation 2.0 6 Social Computing Specialised Systems Mashup and Composite Applications 7 Security – Activity Monitoring Social Software and Social Networking Web Platform and Web-Oriented Architectures 8 Flash Memory Unified Communications Computing Fabric 9 Virtualisation for Availability Business Intelligence Real World Web 10 Mobile Applications Green IT Social Software

Gartner – Key IT Trends 2008 - 2010:

January 9, 2011 21 Gartner – Key IT Trends 2008 - 2010 How relevant are these trends to you and your organisation?

AICPA Top 15 IT Initiatives 2001-2009:

January 9, 2011 22 AICPA Top 15 IT Initiatives 2001-2009 2009 2008 2007 2006 2005 2004 2003 2002 2001 1 Information Security Management Information Security Management Information Security Management Information Security Information Security Information Security Information Security Business And Financial Reporting Applications Information Security And Controls 2 Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management Spam Technology Business Information Management Training And Technology Competency E-Business 3 Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration Digital Optimisation Application Integration Information Security and Controls Electronically-based Business and Financial Reporting 4 Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology Database and Application Integration Web Services Quality of Service Privacy 5 Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery Wireless Technologies Disaster Recovery Disaster Recovery Planning and Business Continuity Management Training and Technology competency 6 Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies Disaster Recovery Wireless Technologies Communication Technologies Bandwidth Disaster Recovery 7 Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies Data Mining Intrusion Detection Remote Connectivity Tools Qualified IT Personnel 8 Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies Virtual Office Intrusion Detection Web-Based and Web-Enabled Applications Quality of Service 9 Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies Business Exchange Technology Customer Relationship Management Qualified IT personnel Electronic Audit Trail 10 Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency Messaging Applications Privacy Messaging Applications (e-mail, faxing, voicemail, instant messaging) Application Service Provider 11 Business Continuity Management and Disaster Recovery Planning Customer Relationship Management (CRM) Training and Awareness E-mail Filtering including Spam and Malware scanning RFID (Radio Frequency Identification) ID/Authentication ID/Authentication 12 Conforming to Assurance and Compliance Standards Improved Application and Data Integration Business Process Improvement, Workflow and Process Exception Alerts Outsourcing Search Radio Frequency Identification (RFID) M-Commerce 13 Collaboration – Information Portals Training and Competency Improved Application and Data Integration Storage and Backup Technologies# Fuel Cells 3G Wireless Tablet PC 14 Business Intelligence Web-deployed Applications Web Deployed Applications Patch and Network Management Tools Digital Home Simple Object Access Protocol (SOAP) 3G Wireless 15 Customer Relationship Management Information Portals Enterprise System Management Technology Competency and Effective Utilisation Display Technology# Autonomic Computers

AICPA Top 10 IT Initiatives 2004-2009:

January 9, 2011 23 AICPA Top 10 IT Initiatives 2004-2009 2009 2008 2007 2006 2005 2004 1 Information Security Management Information Security Management Information Security Management Information Security Information Security Information Security 2 Privacy Management IT Governance Identity And Access Management Assurance And Compliance Applications Electronic Document Management Spam Technology 3 Secure Data File Storage, Transmission And Exchange Business Continuity Management And Disaster Recovery Planning Conforming To Assurance And Compliance Standards Disaster And Business Continuity Planning Data Integration Digital Optimisation 4 Business Process Improvement, Work Flow and Process Exception Alerts Privacy Management Privacy Management IT Governance Spam Technology Database and Application Integration 5 Mobile and Remote Computing Business Process Improvement, Workflow and Process Exception Alerts Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery Wireless Technologies 6 Training and Competency Identity and Access Management IT Governance Digital Identity and Authentication Technologies Collaboration and Messaging Technologies Disaster Recovery 7 Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Wireless Technologies Wireless Technologies Data Mining 8 Improved Application and Data Integration Business Intelligence Mobile and Remote Computing Application and Data Integration Authentication Technologies Virtual Office 9 Document, Forms, Content and Knowledge Management Mobile and Remote Computing Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies Business Exchange Technology 10 Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management Spyware Detection and Removal Learning and Training Competency Messaging Applications

Security, Privacy, Governance, Disaster Recovery:

January 9, 2011 24 Security, Privacy, Governance, Disaster Recovery 2009 2008 2007 2006 2005 2004 2003 2002 2001 1 Information Security Management Information Security Management Information Security Management Information Security Information Security Information Security Information Security Information Security And Controls 2 Privacy Management IT Governance Identity And Access Management 3 Business Continuity Management And Disaster Recovery Planning Disaster And Business Continuity Planning Information Security and Controls 4 Privacy Management Privacy Management IT Governance Privacy 5 Disaster Recovery Planning and Business Continuity Management Privacy Management Disaster Recovery Disaster Recovery Disaster Recovery Planning and Business Continuity Management 6 Identity and Access Management IT Governance Digital Identity and Authentication Technologies Disaster Recovery Disaster Recovery 7 Identity and Access Management Conforming to Assurance and Compliance Standards Securing and Controlling Information Distribution Intrusion Detection 8 Authentication Technologies Intrusion Detection 9 Electronic Audit Trail 10 Spyware Detection and Removal 11 Business Continuity Management and Disaster Recovery Planning ID/Authentication ID/Authentication 12 Conforming to Assurance and Compliance Standards 13 14 15

Data, Information and Document Management/ Integration and Analysis and Related Initiatives:

January 9, 2011 25 Data, Information and Document Management/ Integration and Analysis and Related Initiatives 2009 2008 2007 2006 2005 2004 2003 2002 2001 1 2 Electronic Document Management Business Information Management 3 Secure Data File Storage, Transmission And Exchange Data Integration Digital Optimisation Application Integration 4 Database and Application Integration 5 6 Digital Identity and Authentication Technologies 7 Data Mining 8 Improved Application and Data Integration Business Intelligence Application and Data Integration 9 Document, Forms, Content and Knowledge Management Electronic Archiving and Data Retention Paperless Digital Technologies Storage Technologies Business Exchange Technology 10 Electronic Data Retention Strategy Document, Forms, Content and Knowledge Management Document, Content and Knowledge Management 11 12 Improved Application and Data Integration 13 Improved Application and Data Integration Storage and Backup Technologies# 14 Business Intelligence 15

AICPA Top 15 IT Initiatives 2001-2009:

January 9, 2011 26 AICPA Top 15 IT Initiatives 2001-2009 Notice any differences? Business-oriented focus of IT initiatives Not concerned with IT plumbing and infrastructure (such as cloud) but on business concerns - running the business - and business-related IT concerns – potential impact of IT systems on the wider business Security, privacy, disaster recovery/business continuity and governance concerns dominate How will cloud computing assist in delivering these initiatives?

It’s Easy to Sneer at Past Predictions But …:

January 9, 2011 27 It’s Easy to Sneer at Past Predictions But … Gartner Highlights Key Predictions for IT Organisations in 2007 and Beyond Vista will be the last major release of Microsoft Windows. The next generation of operating environments will be more modular and will be updated incrementally. The era of monolithic deployments of software releases is nearing an end. Microsoft will be a visible player in this movement, and the result will be more-flexible updates to Windows and a new focus on quality overall. Blogging and community contributors will peak in the first half of 2007. Given the trend in the average life span of a blogger and the current growth rate of blogs, there are already more than 200 million ex-bloggers. Consequently, the peak number of bloggers will be around 100 million at some point in the first half of 2007. By 2010, 60% of the worldwide cellular population will be "trackable" via an emerging "follow-me Internet." Local regulations have arisen to protect users' privacy, but growing demands for national safety and civil protection are relaxing some of the initial privacy limitations. Marketing incentives will also push users to forgo privacy concerns, and many other scenarios will enable outsiders to track their users.

Private Cloud Computing:

January 9, 2011 28 Private Cloud Computing Cloud computing is largely an IT-focussed initiative that potentially allows IT manage systems and applications infrastructure more effectively

Private Cloud:

January 9, 2011 29 Private Cloud Private cloud should consist of computing, network and storage hardware packaged with key management, administration and control facilities into self-contained systems and applications infrastructure Not a panacea There is no such thing as an IT system that does not require maintenance and management Cloud computing is a means to an end and not an end in itself Management, Administration and Control Backup and Recovery Disaster Recovery Service Management Information Collection and Auditing Provisioning Resource Management Application Lifecycle Management Data Management Security

Cloud Processes:

January 9, 2011 30 Cloud Processes Possible suite of service management processes associated with conversion to cloud

Public Cloud:

January 9, 2011 31 Public Cloud Potential for fragmentation of applications and associated data as specific business applications are run on separate clouds from separate suppliers Data Integration CRM Mail and Messaging Document Management ERP Application Usage

Public Cloud:

January 9, 2011 32 Public Cloud Offers the potential for the business to bypass the IT function and buy the application from the cloud vendor, leading to a proliferation of disparate platforms and systems Public cloud needs to be viewed as a form of outsourcing and needs to be implemented with the same care Look to learn from the lessons from problems with outsourcing Vendors will target business rather than IT staff and IT will be landed with implementation, maintenance and support

Cloud and The Business:

January 9, 2011 33 Cloud and The Business IT needs to be aware and beware of: If IT cannot help us, who else can?

Disconnect Between What the Business Wants and What IT Delivers:

January 9, 2011 34 Disconnect Between What the Business Wants and What IT Delivers

IT Value Management is a Key Topic for IT:

January 9, 2011 35 IT Value Management is a Key Topic for IT Results of managing IT for business value Budget flexibility coupled with strategic IT alignment leads to 50% greater IT payoffs Improving management practices alongside IT investment drives 20% higher IT yields

Lessons Learned from Outsourcing Problems:

January 9, 2011 36 Lessons Learned from Outsourcing Problems Smoothly Transferring Services And Resources Common cause of failure is the ineffective management of the transfer of services and resources to the service provider, leading to service delivery problems Successful service providers rigorously control the transfer of services and resources to ensure that the new service is able to adequately deliver the service and the service continuity is maintained. Maintaining Stakeholder Expectations Common source of failure in sourcing engagements is a difference in expectations between the client, the service provider, and the suppliers and partners Identifying and managing those expectations helps to ensure a common understanding of what is necessary for success Translating Implicit And Explicit Needs Into Defined Requirements With Agreed Upon Levels Of Quality Frequent cause of failure in sourcing is that the service provider does not fully understand the needs of the client Successful service providers rigorously gather and analyse the stated and unstated needs, then translate those needs into a set of documented requirements Successful service providers also recognise that needs change over time and establish provisions for gathering and analysing modifications to their services

Lessons Learned from Outsourcing Problems:

January 9, 2011 37 Lessons Learned from Outsourcing Problems Reviewing Service Design And Deployment To Ensure An Adequate Coverage Of The Client’s Requirements Failure in sourcing is caused by the service provider not fully addressing the needs of the client To ensure that the service delivery will meet the client’s needs successful engagements include rigorous reviews of the service design and deployment activities by the clients and the service provider prior to service delivery Managing Client’s Security Managing security and controlling critical data and assets are critical to establishing trust Security management includes protection of intellectual property, confidentiality, and privacy concerns Monitoring And Controlling Activities To Consistently Meet The Service Delivery Commitments Successful service providers rigorously monitor their service delivery activities to ensure that the client’s commitments are being met Actions are taken to resolve and prevent problems, thereby escalating issues as appropriate to ensure that they are addressed in a timely basis

Lessons Learned from Outsourcing Problems:

January 9, 2011 38 Lessons Learned from Outsourcing Problems Monitoring And Managing Client’s And End User’s Satisfaction Success is not always defined in terms of meeting the agreed upon commitments, because clients and end users may be unsatisfied even when commitments are being met Successful sourcing engagements monitor the satisfaction levels of the stakeholders to identify problems and take action Managing Employee Satisfaction, Motivation, And Retention IT-enabled sourcing often involves challenges during transition, deployment, and service delivery High employee turnover jeopardises the service provider’s ability to meet its client’s requirements and undermines their expected gains and performance levels Proactively monitoring and managing employee satisfaction and motivation can improve personnel retention and effectiveness Managing Technological Shifts And Maintaining The Availability, Reliability, Accessibility, And Security Of Technology Technology is a key component of outsourcing Major challenges for the service provider include keeping pace with rapid changes in technology and effectively managing the technology infrastructure while changes are incorporated

Summary:

January 9, 2011 39 Summary Trends come from many sources: analysts, industry bodies, vendors, surveys, publications and some of these may be tendentious A trend needs to be validated against your geography, operating area, organisation size and technology maturity Adopting a trend is not an automatic guarantee of benefits - there are rarely easy answers - you have to work at it There is still a need for architecture, analysis, design, validation to ensure that you will derive the greatest benefits from adopting new technologies/systems/applications Private cloud can offer flexibility Public cloud is a form of outsourcing and needs to be managed as such There is no such thing as an IT system that does not require maintenance and management

authorStream Live Help