Book Image

Technology Operating Models for Cloud and Edge

By : Ahilan Ponnusamy, Andreas Spanner
Book Image

Technology Operating Models for Cloud and Edge

By: Ahilan Ponnusamy, Andreas Spanner

Overview of this book

Cloud goals, such as faster time to market, lower total cost of ownership (TCO), capex reduction, self-service enablement, and complexity reduction are important, but organizations often struggle to achieve the desired outcomes. With edge computing gaining momentum across industries and making it possible to move workloads seamlessly between cloud and edge locations, organizations need working recipes to find ways of extracting the most value out of their cloud and edge estate. This book provides a practical way to build a strategy-aligned operating model while considering various related factors such as culture, leadership, team structures, metrics, intrinsic motivators, team incentives, tenant experience, platform engineering, operations, open source, and technology choices. Throughout the chapters, you’ll discover how single, hybrid, or multicloud architectures, security models, automation, application development, workload deployments, and application modernization can be reutilized for edge workloads to help you build a secure yet flexible technology operating model. The book also includes a case study which will walk you through the operating model build process in a step-by-step way. By the end of this book, you’ll be able to build your own fit-for-purpose distributed technology operating model for your organization in an open culture way.
Table of Contents (13 chapters)
1
Part 1:Enterprise Technology Landscape and Operating Model Challenges
6
Part 2: Building a Successful Technology Operating Model for Your Organization
8
Chapter 6: Your Distributed Technology Operating Model in Action

The external factors

External factors that are required or mandated play a significant role in enabling organizations to implement a hybrid cloud architecture. Some of these external factors are as follows:

  • Regional compliance requirements
  • Infrastructure limitations
  • Mergers and acquisitions

Regional compliance requirements

Regional compliance (and security) requirements are the most common and well-known reason for organizations to embrace a hybrid cloud deployment model. One such requirement is the data sovereignty requirements that differ from region to region. Here are some examples of data sovereignty requirements:

  • European Union: The data sovereignty requirement for the EU is called the GDPR. The GDPR requires that the personal data of EU citizens is stored and processed within the EU or in a country that the EU has deemed to have adequate data protection laws.
  • Russia: The Personal Data Law of Russia requires that the personal data of Russian...