Business Efficiency Cloud

Moving to the “Business Efficiency Cloud”

Our term “moving to the Business Efficiency Cloud ” refers to an organization moving away from a traditional CAPEX model (buy the dedicated hardware and depreciate it over a period of time) to the OPEX model (use a shared cloud infrastructure and pay as one uses it). The present availability of high-capacity networks, low-cost computers and storage devices as well as the widespread adoption of hardware virtualization, service-oriented architecture, and autonomic and utility computing have led to a growth in cloud computing. Companies can scale up as computing needs increase and then scale down again as demands decrease.

Recognizing the growth of cloud computing, BES has developed and branded a Business-aligned cloud strategy, complete with security, application development and testing to help accelerate client cloud computing initiatives. The BES Cloud Strategy consists of the following;

  • Cloudware (Cloud-enabled Applications): Development and Inmplementation of “Business Efficiency Applications” with complete turn-key ‘Cloud Implementations’ (SaaS Model)
  • Cloud Consulting: Cloud Computing Consulting including Design, Development and Implementation of Cloud Computing Strategies, Platforms, Software and Services such as building of Private Clouds and Custom Platforms (IaaS and PaaS inmplementations).

IMG_04122015_161511

Characteristics of the “Business Efficiency Cloud”

The Business Efficiency Cloud exhibits the following key characteristics:

  • Agility improves with users’ ability to re-provision technological infrastructure resources.
  • Cost reductions  A public (or private in many cases) cloud delivery model converts capital expenditure to operational expenditure. This purportedly lowers barriers to entry, as infrastructure is typically provided by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house).
  • Device and location independence enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.
  • Maintenance of cloud computing applications is easier, because they do not need to be installed on each user’s computer and can be accessed from different places.
  • Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:  (a) Centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.) (b) Peak-load capacity increases (users need not engineer for highest possible load-levels) and (c) utilisation and efficiency improvements for systems that are often only 10–20% utilised.
  • Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.
  • Productivity may be increased when multiple users can work on the same data simultaneously, rather than waiting for it to be saved and emailed. Time may be saved as information does not need to be re-entered when fields are matched, nor do users need to install application software upgrades to their computer.
  • Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery.
  • Scalability and elasticity via dynamic (“on-demand”) provisioning of resources on a fine-grained, self-service basis in near real-time  without users having to engineer for peak loads.
  • Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle. However, the complexity of security is greatly increased when data is distributed over a wider area or over a greater number of devices, as well as in multi-tenant systems shared by unrelated users. Private cloud installations are in part motivated by users’ desire to retain control over the infrastructure and avoid losing control of information security.