It’s been over a month since I attended the Gartner IT Symposium/Xpo in Orlando and I’ve spent that time really chewing on some of the great sessions and thought leadership presented at the show. Modern IT practices remain a moving target so plugging into the analyst machine every once in a while helps me get a bigger picture beyond even our day to day at Green House Data (which can be pretty diverse itself, with big pushes on DevOps and digital transformation while we balance our existing data center, cloud, and managed services pillars).
It was interesting hearing Gartner start to shift their message from “cloud is the only option” to “cloud is an option.” As cloud adoption strategies have matured we have seen this attitude shift as well, with more organizations looking multi-cloud while maintaining some on-prem systems. One presentation on public cloud costs compared to on-prem data centers really helped drive this home. The bottom line is that the cloud is not automatically cheaper or even necessarily more efficient depending on the application or purpose of the deployment.
Other major topics included how to find digital talent, as the management of human capital and IT teams continues to evolve alongside the industry, as well as one of my favorite presentations, “Are You Maximizing Your Security Operations Center,” which had a ton of great information around security.
With the symposium still fresh in mind, here is my list of where enterprise IT operations are heading in 2020 and beyond.
Green House Data was onsite last week at Microsoft Ignite. We had some incredible conversations at our booth about Azure, PowerApps, application modernization, DevOps, Windows Server end of support, and more. Of course, while we were working the floor, Microsoft made a bevy of product announcements around core products and services that are sure to shake up your IT world! I’m super excited about these new developments, so here are my top takeaways from the show.
Data migration takes many forms, including moving data between storage locations or mediums, changing the format of the data, and sharing or importing data between applications. It’s required when retiring a legacy system, introducing new apps or services, migrating to the cloud, or consolidating your data center.
Data storage can be a complicated beast thanks to the myriad ways data grows and integrates with various components of your IT infrastructure. A secondary goal of any data migration project should therefore be data management itself, reducing complexities introduced by application logic, customization, governance, and other entanglements.
Regardless of the destination of your data or the business drivers behind the migration, you’ll need to extract your data, modify it, and perform the actual data transfer. Detailed planning and risk evaluation are key before proceeding, especially as you are likely to handle some sensitive information.
It happens to everyone at some point. Your budget gets slashed; the economy tanks; you’re suddenly in the red thanks to cloud sprawl. Whatever the cause, you’ll likely face a mandatory cost cutting initiative at some point in your IT career.
While cost cutting is a reality, it is fundamentally different from ongoing cost optimization. You should be practicing cost optimization as part of your regular duties, reviewing spend and ensuring the technology, hardware, software, and services in use across your organization are serving their business need and appropriately configured in scope and performance.
By formulating and practicing a cost optimization protocol, you’ll be prepared should the day for cost cutting ever come, while also gathering evidence for the impact IT has on the overall bottom line.
If your organization is large enough to have an information security manager or an entire security team, then it’s likely that any security issue or task will be pushed in their direction. That’s why you hired them, isn’t it?
Security is a specialized area of IT and it requires specific skills for a holistic approach. It is also a moving target with many components and attack vectors across your technology stack. A dedicated security team or individual, whether in-house or contracted, can therefore be valuable. But security must be a shared responsibility among every user, no matter their role.
There’s an inherent problem here and its name is Diffusion of Responsibility. When everyone has a stake in security and there are dedicated managers to boot, users could be more likely to engage in risky behavior. After all, it’s taken care of! That’s why we hired that security guy.