Welcome!

Microservices Expo Authors: Jason Bloomberg, Karthick Viswanathan, Elizabeth White, Mehdi Daoudi, Pat Romanski

Related Topics: Microservices Expo, Containers Expo Blog, @CloudExpo

Microservices Expo: Blog Post

Dynamic Decision Making and IT Operations

Planning for technology infrastructure and architecture

As business technology managers we are constantly challenged by a need to support a broad spectrum of information technologies within our organizations. Now more so with the establishment of the amalgamation of services that now comprises the cloud computing ecosystem.

The pure purpose of these technologies is to improve end-users needs as these systems evolve. Managers are in turn constantly challenged in an effort to present and optimize a single infrastructure to support the many different requirements within organizations.

We are blitzed daily with newer and allegedly better means to choose, implement, hone, improve, migrate or upgrade our technologies, via web-casts, product pitches, conferences, email blasts etc.

Some points to consider: are some of these marketing pitches for "change/upgrades" really necessary or inherently imperative to ensuring that operations run lean, effective as well as within compliance and budgetary requirements? The only fact that I subscribe to is, systems are dynamic in nature.

As managers, we need to evaluate the most appropriate of practices that will benefit our organization. These should include national and international standards, business goals, objectives and needs; budgetary requirements, external & internal threats, internal operational requirements. After which we should compile a decision matrix and rank requirements on importance or impact on functionality across the enterprise, which should align on-going IT operations with business requirements...and then choose to effect change ...or not.
Factors that should be considered are the intervals in time that we finalize IT operational decisions e.g. at the start of a project or in the instance where we encounter some event which changes our IT functions in a manner that warrants a re-evaluation of technologies.

Personally when I am commissioned to lead a project, I walk into our brainstorming armed with my well-worn Ishikawa (fishbone) mind-set.

Why?, well as most project managers will attest to, the requirements in week one never matches the requirements say in week six of a twelve week project. For me a good rule of thumb is to have an appropriate grasp of the end result required by senior management /client and draft a reverse process with my team to match the initial requirement. This leaves us ample branches for change in requirements from senior management or a client (as expected) and by extension, gives us some latitude with time and budget management.

I agree with my peers that, in order to ensure the successful operation of any IT infrastructure a solid framework must be in place. There are several standards that we can draw from during our planning implementation and control stages, some of which are :

ISO - 27001:2005 & BS 17799 - ISO 27002:2005
CoBIT - Control Objectives for Information and Related Technology
ITIL - IT Infrastructure Library
CMMi - Capability Maturity Model Integration

The importance of ITIL is well documented, especially given its place with respect to ISO 27001 in a sense, however I do believe that one methodology can draw on the other in certain instances.

The ISO27001/2 series defines an information management framework which sets; directions, aims, objectives as well as defines a management approved policy and holds management commitment.
Its processes methodically identify security requirements by assessing security risks.

The results of these assessments help guide the prioritizing of metrics to manage risks and the appropriate management action.

This then guides the selection and implementation of controls (policies, practices, procedures, organizational structures, software/hardware functions) and mechanisms.

Controls implemented subjectively should follow the identification of security requirements; with their aim, being, to ensure that risks are reduced to an acceptable level while meeting an organization's security objectives. Why panic and spend $50,000 to mitigate a risk that will cost an enterprise $100.

The ISO 27001 prescribes a Plan-Do-Check-Act, Process Approach. The fact that it is a Process Approach emphasizes user understanding of an organization's information security requirements and can help define and establish information security policies and objectives including it's well known Information Security Management System (ISMS) framework.

Following on the guideline of ISO27001's ISMS is ISO 27002:2005 which can be regarded as a comprehensive collection of good security processes. These define a standard code of practice outlining techniques one can implement to secure data.
When drafting our decision matrix for frameworks we need to be cognizant of framework overload; set implementation goals for frameworks and ensure that we have adequate project management resources.

However when it comes to roll outs, the preference is to proceed cautiously (as with any framework roll-out) because the of-chance of an incorrect categorization of control objectives and/or application can defeat the purpose of a framework implementation & ROI assessment.

Typically other Six Sigma processes can augment the above stated methodologies very well with my favorite being a variation of the Failure Mode and Effects Analysis (FMEA).

In conclusion I subscribe to the school of thought where; we should embark on hardware and other system related infrastructure based on controls and objects which are independent of vendor marketing pitches.

The goal in mind should always be how to improve our systems based on our enterprise's need, the budgetary and operational impact and our business objectives.  If any one system is functioning effectively per managements defined requirements and business objectives, why upgrade if all you are going to get are the same results pre upgrade?

What may work say in one small business enterprise may not necessarily be effective in another similar sized enterprise or another type of business operations.

More Stories By Jon Shende

Jon RG Shende is an executive with over 18 years of industry experience. He commenced his career, in the medical arena, then moved into the Oil and Gas environment where he was introduced to SCADA and network technologies,also becoming certified in Industrial Pump and Valve repairs. Jon gained global experience over his career working within several verticals to include pharma, medical sales and marketing services as well as within the technology services environment, eventually becoming the youngest VP of an international enterprise. He is a graduate of the University of Oxford, holds a Masters certificate in Business Administration, as well as an MSc in IT Security, specializing in Computer Crime and Forensics with a thesis on security in the Cloud. Jon, well versed with the technology startup and mid sized venture ecosystems, has contributed at the C and Senior Director level for former clients. As an IT Security Executive, Jon has experience with Virtualization,Strategy, Governance,Risk Management, Continuity and Compliance. He was an early adopter of web-services, web-based tools and successfully beta tested a remote assistance and support software for a major telecom. Within the realm of sales, marketing and business development, Jon earned commendations for turnaround strategies within the services and pharma industry. For one pharma contract he was responsibe for bringing low performing districts up to number 1 rankings for consecutive quarters; as well as outperforming quotas from 125% up to 314%. Part of this was achieved by working closely with sales and marketing teams to ensure message and product placement were on point. Professionally he is a Fellow of the BCS Chartered Institute for IT, an HITRUST Certified CSF Practitioner and holds the CITP and CRISC certifications.Jon Shende currently works as a Senior Director for a CSP. A recognised thought Leader, Jon has been invited to speak for the SANs Institute, has spoken at Cloud Expo in New York as well as sat on a panel at Cloud Expo Santa Clara, and has been an Ernst and Young CPE conference speaker. His personal blog is located at http://jonshende.blogspot.com/view/magazine "We are what we repeatedly do. Excellence, therefore, is not an act, but a habit."

@MicroservicesExpo Stories
Many organizations are now looking to DevOps maturity models to gauge their DevOps adoption and compare their maturity to their peers. However, as enterprise organizations rush to adopt DevOps, moving past experimentation to embrace it at scale, they are in danger of falling into the trap that they have fallen into time and time again. Unfortunately, we've seen this movie before, and we know how it ends: badly.
These days, APIs have become an integral part of the digital transformation journey for all enterprises. Every digital innovation story is connected to APIs . But have you ever pondered over to know what are the source of these APIs? Let me explain - APIs sources can be varied, internal or external, solving different purposes, but mostly categorized into the following two categories. Data lakes is a term used to represent disconnected but relevant data that are used by various business units wit...
There is a huge demand for responsive, real-time mobile and web experiences, but current architectural patterns do not easily accommodate applications that respond to events in real time. Common solutions using message queues or HTTP long-polling quickly lead to resiliency, scalability and development velocity challenges. In his session at 21st Cloud Expo, Ryland Degnan, a Senior Software Engineer on the Netflix Edge Platform team, will discuss how by leveraging a reactive stream-based protocol,...
Today most companies are adopting or evaluating container technology - Docker in particular - to speed up application deployment, drive down cost, ease management and make application delivery more flexible overall. As with most new architectures, this dream takes significant work to become a reality. Even when you do get your application componentized enough and packaged properly, there are still challenges for DevOps teams to making the shift to continuous delivery and achieving that reducti...
21st International Cloud Expo, taking place October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Me...
Enterprises are moving to the cloud faster than most of us in security expected. CIOs are going from 0 to 100 in cloud adoption and leaving security teams in the dust. Once cloud is part of an enterprise stack, it’s unclear who has responsibility for the protection of applications, services, and data. When cloud breaches occur, whether active compromise or a publicly accessible database, the blame must fall on both service providers and users. In his session at 21st Cloud Expo, Ben Johnson, C...
Many organizations adopt DevOps to reduce cycle times and deliver software faster; some take on DevOps to drive higher quality and better end-user experience; others look to DevOps for a clearer line-of-sight to customers to drive better business impacts. In truth, these three foundations go together. In this power panel at @DevOpsSummit 21st Cloud Expo, moderated by DevOps Conference Co-Chair Andi Mann, industry experts will discuss how leading organizations build application success from all...
‘Trend’ is a pretty common business term, but its definition tends to vary by industry. In performance monitoring, trend, or trend shift, is a key metric that is used to indicate change. Change is inevitable. Today’s websites must frequently update and change to keep up with competition and attract new users, but such changes can have a negative impact on the user experience if not managed properly. The dynamic nature of the Internet makes it necessary to constantly monitor different metrics. O...
The last two years has seen discussions about cloud computing evolve from the public / private / hybrid split to the reality that most enterprises will be creating a complex, multi-cloud strategy. Companies are wary of committing all of their resources to a single cloud, and instead are choosing to spread the risk – and the benefits – of cloud computing across multiple providers and internal infrastructures, as they follow their business needs. Will this approach be successful? How large is the ...
Agile has finally jumped the technology shark, expanding outside the software world. Enterprises are now increasingly adopting Agile practices across their organizations in order to successfully navigate the disruptive waters that threaten to drown them. In our quest for establishing change as a core competency in our organizations, this business-centric notion of Agile is an essential component of Agile Digital Transformation. In the years since the publication of the Agile Manifesto, the conn...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
The nature of the technology business is forward-thinking. It focuses on the future and what’s coming next. Innovations and creativity in our world of software development strive to improve the status quo and increase customer satisfaction through speed and increased connectivity. Yet, while it's exciting to see enterprises embrace new ways of thinking and advance their processes with cutting edge technology, it rarely happens rapidly or even simultaneously across all industries.
Most of the time there is a lot of work involved to move to the cloud, and most of that isn't really related to AWS or Azure or Google Cloud. Before we talk about public cloud vendors and DevOps tools, there are usually several technical and non-technical challenges that are connected to it and that every company needs to solve to move to the cloud. In his session at 21st Cloud Expo, Stefano Bellasio, CEO and founder of Cloud Academy Inc., will discuss what the tools, disciplines, and cultural...
With the rise of DevOps, containers are at the brink of becoming a pervasive technology in Enterprise IT to accelerate application delivery for the business. When it comes to adopting containers in the enterprise, security is the highest adoption barrier. Is your organization ready to address the security risks with containers for your DevOps environment? In his session at @DevOpsSummit at 21st Cloud Expo, Chris Van Tuin, Chief Technologist, NA West at Red Hat, will discuss: The top security r...
"NetApp's vision is how we help organizations manage data - delivering the right data in the right place, in the right time, to the people who need it, and doing it agnostic to what the platform is," explained Josh Atwell, Developer Advocate for NetApp, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
The “Digital Era” is forcing us to engage with new methods to build, operate and maintain applications. This transformation also implies an evolution to more and more intelligent applications to better engage with the customers, while creating significant market differentiators. In both cases, the cloud has become a key enabler to embrace this digital revolution. So, moving to the cloud is no longer the question; the new questions are HOW and WHEN. To make this equation even more complex, most ...
One of the biggest challenges with adopting a DevOps mentality is: new applications are easily adapted to cloud-native, microservice-based, or containerized architectures - they can be built for them - but old applications need complex refactoring. On the other hand, these new technologies can require relearning or adapting new, oftentimes more complex, methodologies and tools to be ready for production. In his general session at @DevOpsSummit at 20th Cloud Expo, Chris Brown, Solutions Marketi...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mobility, enabled by an automated and seamless flow across on-premises and cloud resources. In his general session at 21st Cloud Expo, Greg Tevis, an IBM Storage Software Technical Strategist and Customer Solution Architec...
Today companies are looking to achieve cloud-first digital agility to reduce time-to-market, optimize utilization of resources, and rapidly deliver disruptive business solutions. However, leveraging the benefits of cloud deployments can be complicated for companies with extensive legacy computing environments. In his session at 21st Cloud Expo, Craig Sproule, founder and CEO of Metavine, will outline the challenges enterprises face in migrating legacy solutions to the cloud. He will also prese...
DevOps at Cloud Expo – being held October 31 - November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's largest enterprises – and delivering real r...