Block title


Once-off decisions when moving to the cloud are dangerous

- Advertisment -

According to Andre Schwan at T-Systems South Africa, many companies embark on their cloud journey, only to further down the line regret early decisions and approaches. This is largely because the problem statement and the expectations that were created at the beginning of the cloud transition were incorrect. The result is that either the performance is not as expected, or the business case fails. 

Research by McKinsey shows that companies fall into the trap by confusing simply moving IT systems to the cloud with the transformational strategy needed to get the full value of the cloud.

“It is important that enterprises understand their current baseline and how it all fits together, including data movement patterns and application use patterns. They must also understand which business processes their applications underpin,” says Schwan.

He advises that organisations start with a business strategy and design that supports these processes and applications. “Just moving what you have into the cloud will not achieve the business value expected or opportunity. It is essential that we design for business outcomes and use all options available to realise these outcomes in the most effective manner”.

Enterprises must overcome two main obstacles. The first being legacy IT that was designed and built in the traditional IT paradigm, which is not suitable to the cloud. Simply moving legacy apps does not make them more dynamic.

The second is that the skillsets required to design, build and run systems in the cloud is significantly different from that of traditional IT. In most cases, a re-design of the organisation is needed, and staff need to be reskilled.

Andre Schwan, T-Systems

The impact of a lack of organisational support and readiness has been widely underestimated when it comes to successful cloud migration. No business case will survive the resistance of the people meant to use it, which means that user adoption is a major driver for getting value out of your cloud environment.

The “lift and shift” approach only works for applications that are suited to it. For most legacy applications, enterprises will probably end up with more cost, less performance and a more complex environment to manage.

The whole point of digital transformation is to evolve to a simpler state that is more agile and offers the business more opportunities by capitalising on modern automation and analytical capabilities and opening new channels to market.  The business threat that we’re countering is that if we don’t grab an opportunity, someone else will and more often than not, it is small new companies, who are by nature of being new, are normally digitally native.”

Organisations also need to understand that they will probably have a hybrid solution for some time, so when selecting technology platforms, they need to consider interoperability, data transfer costs and a private cloud design.

T-system’s advice is to be very selective when it comes to your cloud provider – multi-cloud providers with a track record of managing complex environments are your best ally in this journey, especially in the early stages when you’re still adjusting your origination. In addition, organisations should avoid technology or platform lock-in, and rather adopt industry standards and platforms that use these standards.

Do not make once-off decisions in isolation. Start with a sound digital transformation strategy and let that lead your decisions!


Please enter your comment!
Please enter your name here

Latest articles

Coronavirus-themed security attacks on the increase

By Indi Siriniwasa, Vice President at Trend Micro Sub-Saharan Africa When there is a crisis, there are those who will try and take advantage. Unfortunately,...

IoT will become the biggest user of edge computing amidst increasing security concerns

From less than $1.5 billion in 2017 to an anticipated $9 billion by 2024, the worldwide edge computing market is set to show significant...

ICASA calls on licensees to make communication services more freely available, while making regulatory concessions

Considering the recent developments with regards to the spread of the COVID-19 pandemic, the Independent Communications Authority of South Africa (ICASA) has written to...

Nine South African students attended US Space and Rocket Centre for 10th annual space camp

Nine South African students recently travelled to the U.S. Space and Rocket Centre (USSRC) in Huntsville, Alabama, as part of the 10th annual Honeywell...

The global outbreak of COVID-19 has brought the world’s digital divide into sharp focus.

ITU News reports that the Internet is a vital communications tool for people and communities affected by the outbreak of the Coronavirus. As schools...

Cybersecurity in automotive industry presents a major challenge

Luxury vehicles are not exempt from cyber-attacks, even if a vehicle is designed with state-of-the art security and maintained with over-the-air software updates during...
- Advertisement -

Surveillance and security service providers must be PRiRA accredited

Any business operating as a surveillance or security service provider, be it for the installation, configuration, support and monitoring of CCTV equipment, for a...

Go cashless, boost SA’s informal sector and reduce COVID-19 spread

COVID-19 has unintentionally encouraged an increase in cashless spending. As a result of the World Health Organisation (WHO) announcement, people are being advised to...

Free coronavirus legal and risk guide

webberwentzel-coronavirus-bookletWebber Wentzel has prepared a legal and risk coronavirus guide in collaboration with their alliance partner, Linklaters. The guide offers practical tips to consider...

Space science: Cosmic rays are increasing at aviation altitudes

Over the past three years, cosmic radiation at aviation altitudes has increased by 12%. In January 2020, students of Earth to Sky Calculus and travelled to...

Ethical hacking now part of BT security advisory services

British Telecom (BT) Security’s ethical hacking team provides ‘penetration testing’ or ‘red team’ services, using the same tools and techniques as cybercriminals to attack...