Feeds

Owning a cloud means learning to love the business

Start a beautiful relationship

High performance access to file storage

One of the problems with trying to improve things is that not everyone appreciates it.

Deploying a private cloud is tantamount to saying that the IT department needs to become a service provider, at least in part. But it also means that the business needs to start acting more like a service consumer.

In principle, there is a lot to like about the new arrangement. Service delivery becomes more efficient, deployment becomes faster, systems run better. Otherwise there is no point in adopting the private cloud model in the first place.

While effective private cloud operation enables more control, it also means more controls and potentially more bureaucracy: “Yes, of course you can have a three-server cluster for your research, just fill out these forms in quadruplicate and get them signed off by the King of Denmark.”

The enemy within

Let's face it, distrust between business departments and IT sometimes goes so far back that nobody can remember what caused it. IT managers are frequently viewed as the people who like to say "no". Anyone who has worked on a support desk knows what a thankless task that can be.

One of the benefits of private cloud is that it offers an opportunity to change the relationship between IT and the business. You need only look at best practice in the way providers deal with customers.

Think of a spectrum: at one end, commodity services delivered at the lowest cost and minimal interaction, and at the other full-fat solutions needing in-depth engagement.

All roads lead to service provisioning

The controls you need in place work across the whole spectrum, in that all roads eventually lead to service provisioning and configuration.

So, is the resulting model really that different from having business analysts conduct requirements capture and service design exercises?

The answer is, it doesn’t have to be. However, while development teams have moved to more agile models in which backlogs of requirements are catalogued and delivered on a priority basis, IT systems delivery and operations is rarely so dynamic.

So what does a good IT-to-business service relationship look like?

All present and correct

Sure, there will be systems and services that just do their thing, unchanging apart from the occasional version upgrade or maintenance tweak. Assuming performance is adequate, these need little more than reporting that all is well.

But in addition to just keeping the lights on we have new service delivery. The less time spent on one, the more will be available for the other – unless you have a particularly draconian finance director, that is, in which case you are unlikely to be taking the private cloud path in the first place.

The key is to integrate the same level of dynamism across both the service definition and delivery process.

Without boring readers with the maths, a simple service delivered quickly can generate far more business value – that is financial return – than a complex one that takes months or years to deploy. It is all to do with compound interest versus development costs.

So, yes, we do need IT-literate people engaging directly with business-literate people to decide exactly what new facilities the private cloud can deliver this month. Or even this week. It may be pie in the sky for some IT departments, but that doesn’t make it wrong.

Not my job, guv

There are plenty of hurdles, not least the common but ultimately unhelpful cry from the business that anything technology-related is "IT’s problem”. But any business today that thinks it can get away with deferring responsibility for IT decisions is living in the last century.

Technologists may also need to change. Bad experiences and the very real complexity that still lurks under the bonnet of the data centre have driven IT people further into the comfort zone of technical geekdom than is helpful.

Every organisation needs its IT crowd, those people who can read the hieroglyphs on the front of the network analyser or identify the crushed patch cable with a cursory glance.

But if private cloud offers an opportunity, it also throws down a challenge to the IT department.

It is only by speaking to the people at the coalface of the organisation in their own, non-technical language that the real opportunities for technology to make a difference can be identified.

You never know, one day the business might even thank you for it. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.