{"id":2562,"date":"2018-07-23T20:27:32","date_gmt":"2018-07-23T20:27:32","guid":{"rendered":"https:\/\/devbloglavaprotocols.nityo.in\/how-a-cloud-operating-model-meets-an-enterprise-cios-needs\/"},"modified":"2018-07-23T20:27:32","modified_gmt":"2018-07-23T20:27:32","slug":"how-a-cloud-operating-model-meets-an-enterprise-cios-needs","status":"publish","type":"post","link":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/how-a-cloud-operating-model-meets-an-enterprise-cios-needs\/","title":{"rendered":"How a Cloud Operating Model meets an Enterprise CIO\u2019s Needs"},"content":{"rendered":"<div style=\"margin-top: 0px; margin-bottom: 0px;\" class=\"sharethis-inline-share-buttons\" ><\/div><p><em><strong>By\u00a0Gregor Hohpe, Technical Director, Office of the CTO, Google<\/strong><\/em><\/p>\n<p><!--more--><\/p>\n<div class=\"module--text h-c-page\">\n<div class=\"h-c-grid\">\n<div class=\"uni-paragraph h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"rich-text\">\n<p>I recently joined the\u00a0<a href=\"https:\/\/www.blog.google\/products\/google-cloud\/octo-google-clouds-two-way-innovation-street\/\">Google Cloud Office of the CTO (a.k.a. \u201cOCTO\u201d)<\/a>\u00a0as technical director, after 5 years as chief architect at one of the world\u2019s largest insurance companies. People often ask me about the differences between these environments, to which I jokingly reply: \u201cAsk me what\u2019s the same; that\u2019s a shorter answer.\u201d<\/p>\n<p>Prior to working in the insurance industry, I\u2019d been a staff software engineer at Google for 7 years. At the time, I felt that all the great technology that Google and other tech giants were building could be very valuable for enterprises \u2014 even if it required them to rethink their existing assumptions and architectures. Jokes aside, having spent extensive time inside both a large enterprise IT and a digital giant, I find that there are more connections and similarities between the two than one might think.<\/p>\n<p>For example, when enterprises migrate their on-premise workloads to the cloud, they start by mapping their existing needs and operational models to those of the cloud providers. During this process, the OCTO team fields lots of questions related to the cloud operating model, and how it differs from their environments \u2014at least at first sight.<\/p>\n<p>Some customers may even start to wonder whether the cloud is really a fit for their \u201ctraditional\u201d enterprise, and not just for cloud-native start-ups. Part of our job is to work with IT leaders to connect the dots, and show them why the cloud operating model is exactly what they need for their enterprises.<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>CIO Agenda<\/strong><\/span><\/h2>\n<p>Today\u2019s CIOs face an exciting, but also quite challenging time. Digital disruption and rapid technology evolution dramatically change expectations for enterprise IT, causing IT organisations to juggle rapid technology evolution and increasing demands from the business to deliver faster and at a lower cost.<\/p>\n<p>Speaking to numerous CIOs, we\u2019ve found that their top agenda items tend to fall into three major buckets:<\/p>\n<ul>\n<li><b>Security<\/b>: No CEO wants to be in the news for a data breach or cyber attack. Among all of a CIO\u2019s challenges, these have the potential to not only harm the business, but also to end your career almost immediately, perhaps even with legal implications. Above all, enterprise IT systems must be kept secure.<\/li>\n<li><b>Uptime<\/b>: Information technology is only good if it runs. Outages can also get you into news, or at least annoy customers and cause you to miss out on revenue opportunities. No CIO likes to be called in to discuss an outage.<\/li>\n<li><b>Cost<\/b>: While security and uptime are the main drivers, IT is still a significant cost factor in most enterprises, sometimes running into the billions of dollars. \u201cDoing more with less\u201d is a common theme with many CIOs as they look to embrace new capabilities while at the same reducing operational expenses.<\/li>\n<\/ul>\n<h2><span style=\"color: #ff6600;\"><strong>Cloud\u2019s Digital Capabilities<\/strong><\/span><\/h2>\n<p>Meanwhile, the key capabilities that web-scale companies and cloud providers like Google use to be successful appear different than CIO\u2019s IT priorities, at least on the surface:<\/p>\n<ul>\n<li><b>Speed<\/b>: In the digital world it\u2019s all about being fast. You\u2019ve got to be able to launch new products quickly, either to be ahead of the competition or to run another round of experiments to make your product better.<\/li>\n<li><b>Automation<\/b>: What makes digital businesses fast at scale is relentless automation. Google deploys billions of container instances every week \u2014you can be assured that none of this is done manually.<\/li>\n<li><b>Feedback<\/b>: Digital enterprises are charting new territory. Hence they need to make small steps, obtain feedback, and improve their product based on that feedback. Instead of running large projects with a meticulously defined target state, they start small, and improve from what they learn.<\/li>\n<\/ul>\n<h2><span style=\"color: #ff6600;\"><strong>Connecting the Dots<\/strong><\/span><\/h2>\n<p>On the surface, these two sets of priorities look quite different: security, reliability and cost vs. speed, automation and feedback. However, knowing that cloud providers like Google successfully fend off cyber attacks on a daily basis, that their core services are almost perfectly reliable, and that they\u2019re able to offer their services at a low price point suggests that there\u2019s a connection here.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"article-module h-c-page\">\n<\/div>\n<div class=\"module--text h-c-page\">\n<div class=\"h-c-grid\">\n<div class=\"uni-paragraph h-c-grid__col h-c-grid__col--8 h-c-grid__col-m--6 h-c-grid__col-l--6 h-c-grid__col--offset-2 h-c-grid__col-m--offset-3 h-c-grid__col-l--offset-3\">\n<div class=\"rich-text\">\n<h2><span style=\"color: #ff6600;\"><strong>Security = Cloud Speed + Automation + Feedback<\/strong><\/span><\/h2>\n<p>Assuring cyber security is no longer a matter of a well-configured firewall and an intrusion prevention system. Both attack vectors and cyber defense have changed dramatically, making cyber security an integral part of IT operations as opposed to a bolt-on or afterthought. The most easily executed attacks often result from known vulnerabilities in outdated versions of operating systems or software frameworks. A single unpatched machine can leave the door fairly wide open for cyber attackers. Similarly, a piece of software that\u2019s being deployed could expose a security weakness that can be exploited. In these cases, being able to revert back to a prior known state quickly is key to keeping your systems secure.<\/p>\n<p>Automated deployments and upgrades are a critical part of keeping your environment secure because they ensure all system components are at a consistent patch level and software updates can be instantly reverted if need be.<\/p>\n<p>Being focused on speed ensures that these actions can be taken without any observable downtime to the user. For example, when the CPU was exploited by Meltdown and Spectre (security vulnerabilities),\u00a0<a href=\"https:\/\/www.blog.google\/topics\/google-cloud\/answering-your-questions-about-meltdown-and-spectre\/\">Google Cloud patched all its servers without any service disruption<\/a>.<\/p>\n<p>Lastly, cyber attacks and breaches occur constantly, with attack methods and defenses ending up in a kind of cat-and-mouse game that ups the ante almost every day. Therefore, your cyber defense can\u2019t be merely a matter of planning, but also one of reacting and evolving quickly through feedback.<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Uptime = Cloud Automation + Feedback<\/strong><\/span><\/h2>\n<p>Hardware fails. Servers fail. Firewalls fail. Even failover systems fail. I once observed a significant on-premise outage due to the back-up power supply not coming online when the first one failed. That\u2019s why a single server or piece of hardware can rarely deliver the desired uptime. The classic response to failure has been to procure high-quality components and to build in redundancy \u2014 but both drive up cost.<\/p>\n<p>Instead, constant feedback and automated deployment allow you to deploy additional instances of your software immediately in case of an actual failure. Such systems are resilient \u2014 they are designed to deal with failure and absorb it without noticeable end user impact. This approach creates systems that have virtually no user-visible outages. For example, people visit Google\u2019s homepage to see whether their Internet connection is working because they\u2019ve never seen that site fail.<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Cost = Cloud Automation + Feedback<\/strong><\/span><\/h2>\n<p>IT expenses are largely driven by software license costs, manual labour and hardware. Traditional, inflexible IT environments tend to massively over-provision hardware that remains under-utilised and delivers a low return on capital investment.<\/p>\n<p>A classic example is redundant hardware, also known as \u201cwarm standby.\u201d The downside of this approach is that to increase system availability from somewhere around 98 percent to closer to 99.5 percent, you need to allocate twice the hardware to the application. Essentially, you double your hardware cost for an additional 1.5 percent of uptime\u2014not a great return on investment.<\/p>\n<p>By automating deployment, a limited, shared pool of hardware can be used to rapidly deploy the application in case of a failure. Better yet, let your cloud provider manage this spare pool, which brings your standby cost to zero.<\/p>\n<p>Additionally, cloud computing offers a consumption-based model that allows you to only pay for hardware you actually need. Automation allows you to rapidly scale up and down your application infrastructure depending on load, allowing you to optimize your cloud usage and further reduce cost. Feedback and transparency gives an indication of any remaining under-utilised hardware that can be decommissioned.<\/p>\n<h2><span style=\"color: #ff6600;\"><strong>Cloud Models Meet Enterprise Goals<\/strong><\/span><\/h2>\n<p>Once you dig a little bit deeper, you quickly notice that digital companies and traditional, large enterprises have the same goals for security, uptime, and cost. However, digital companies using a cloud model have learned to achieve them using different mechanisms. The good news is that what they\u2019ve learned and built is directly applicable to, and directly benefits, traditional enterprises.<\/p>\n<p>By connecting the dots, enterprise IT leaders realise that as the external world changes, a cloud-oriented operating model is the natural way to achieve the key metrics expected from a CIO and their IT organisation these days.<\/p>\n<\/div>\n<p><a href=\"https:\/\/www.blog.google\/products\/google-cloud\/how-the-cloud-operating-model-meets-enterprise-cio-needs\/\" rel=\"noopener\" target=\"_blank\">Article<\/a> first appeared on the Google Blog.<\/p>\n<p><i><span style=\"font-weight: 400;\">Lava is an authorised Cloud Partner of Google and is a <\/span><\/i><a href=\"https:\/\/lavaprotocols.com\/google-apps-for-work\/\"><i><span style=\"font-weight: 400;\">reseller of G Suite<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> (previously known as Google Apps, Google Maps for Work, and Google Cloud Platform) in Malaysia. With more than a decade of experience in the industry, we\u2019re proud to say we\u2019re one of the leading cloud consultants and service providers in the Asia Pacific region.<\/span><\/i><\/p>\n<p><script type=\"text\/javascript\">\npiAId = '418952';\npiCId = '56152';\npiHostname = 'pi.pardot.com';<\/p>\n<p>(function() {\n\tfunction async_load(){\n\t\tvar s = document.createElement('script'); s.type = 'text\/javascript';\n\t\ts.src = ('https:' == document.location.protocol ? 'https:\/\/pi' : 'http:\/\/cdn') + '.pardot.com\/pd.js';\n\t\tvar c = document.getElementsByTagName('script')[0]; c.parentNode.insertBefore(s, c);\n\t}\n\tif(window.attachEvent) { window.attachEvent('onload', async_load); }\n\telse { window.addEventListener('load', async_load, false); }\n})();\n<\/script><\/p>\n<\/div>\n<\/div>\n<\/div>\n<p><span class=\"et_bloom_bottom_trigger\"><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enteprise IT teams tend to field questions related to cloud operating model due to the issue of security, uptime and cost. But here&#8217;s what you need to know.<\/p>\n","protected":false},"author":1,"featured_media":486,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[149,18,59,67],"class_list":["post-2562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-automated-deployment","tag-blog","tag-cloud-horizon","tag-google-for-work"],"jetpack_featured_media_url":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-content\/uploads\/2021\/06\/galler1.jpg","_links":{"self":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/comments?post=2562"}],"version-history":[{"count":0,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/posts\/2562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media\/486"}],"wp:attachment":[{"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/media?parent=2562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/categories?post=2562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lavaprotocols.com\/the-cloud-blog\/wp-json\/wp\/v2\/tags?post=2562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}