Q&A: The Many Aspects of Private Cloud Computing
|
|
|
- Adrian Haynes
- 10 years ago
- Views:
Transcription
1 Research Publication Date: 22 October 2009 ID Number: G Q&A: The Many Aspects of Private Cloud Computing Thomas J. Bittman Cloud computing is at the Peak of Inflated Expectations on the Gartner "Hype Cycle for Cloud Computing, 2009." The idea of private cloud computing is appealing, extremely confusing, and very misleading. We discuss common questions and answers. Reproduction and distribution of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner's research may discuss legal issues related to the information technology business, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The opinions expressed herein are subject to change without notice.
2 ANALYSIS What is private cloud computing? Gartner defines private cloud computing as: "A style of computing where scalable and elastic ITenabled capabilities are delivered as a service to internal customers using Internet technologies." In practice, a private cloud-computing service behaves just like an external (public) cloudcomputing service, except the implementation is internal to an organization, and access is limited to internal users. However, private cloud computing still requires a service interface that gives it a similar look and feel to the end user of an external service. The implementation, which is hidden from the user, still needs to be scalable, shared, automated and elastic (see "Private Cloud Computing: The Steppingstone to the Cloud"). What are the benefits of private cloud computing? Like public cloud services, private cloud services are easy for customers to start using (a low barrier to entry) startup time for the user of the service is short, and the process is straightforward and does not require implementation details. It is scalable so that the end user does not perceive limits in physical scaling, and it is elastic that is, growing and shrinking with usage. The end user pays for a private cloud service based on usage (or the service is subsidized for example, by advertisers), and is not based on fixed implementation costs. Finally, a private cloud service enables an easier migration to public cloud services at some point in the future. Is private cloud computing just a well-run data center? While this is a common question, it is comparing the wrong things. Private cloud computing is a style of architecture and delivery of a service. A well-run data center has many services that may include private cloud services or may not. The only time these two can be equated is for a data center (such as Google) that is designed around a very small number of services. Large, well-run IT organizations eventually will manage and deliver private cloud services (cost-effectively), source some services from the public cloud, and retain well-run but noncloud architectures for services not suited to the cloud-computing style (for example, services that are business differentiators, and possibly changing often as the business changes). Why build a private cloud service rather than buy public cloud services? While cloud computing holds tremendous promise, only a limited number of services and service levels are available today. Most enterprises manage many services, most of which cannot be addressed by today's external offerings. Some cloud services have a business model predicated on very high volume, consumers or advertising (such as Google), rather than on enterprise requirements. Services that have specific performance, availability, security, regulatory or legal requirements may not be served by public cloud services for some time or ever. The current situation is that: The technologies needed to develop robust public cloud offerings are often immature or do not yet exist. The ability to move virtual machines to and from service providers is just becoming a reality. Pricing and licensing models for public cloud computing are immature. Publication Date: 22 October 2009/ID Number: G Page 2 of 6
3 The cloud service provider market also is extremely immature, and will result in new providers emerging quickly, while others fail. Remediation for failed services is another immature area, and interoperability standards to make recovery from a failed provider possible don't yet exist. For all of these reasons, there will be many cases where private cloud services make good business sense, at least until public cloud services mature. Is private cloud computing right for enterprises of all sizes? No. A key benefit and rationale of cloud computing is having shared resources and economies of scale. Small businesses that do not have enough resources to share will not be able to derive the cost savings benefit from a private cloud-computing style. They will usually be better served by focusing on operational improvements and consolidation, and leveraging external cloud services as soon as they mature (this is especially true for startups). However, "economies of scale" is a relative term, and there will be many examples of midsize businesses (with hundreds of servers, for example) that will be able to build a business case for private cloud computing, at least in the near term (see "Cloud Computing Doesn't Require Massive Providers"). The business case will always depend on the cost, the return on the investment, and an evaluation of the maturity of public cloud service offerings. Are there cloud-computing styles between fully public and fully private? Of course, and these "hybrid" styles will probably be the most common (see "The Spectrum of Public-to-Private Cloud Computing"). Two dimensions to describe the range of options between fully public and fully private cloud computing are access (Is it limited, or can anyone access the service?) and ownership/control (Do users control and own the implementation, or is it completely controlled and owned by a third party?). Impressive examples include the virtual private cloud (where a third party limits access to certain IT resources to a single user), a targeted industry service (where a third party provides a service to a limited and possibly proprietary market), a community cloud (as defined by the U.S. National Institute of Standards and Technology [NIST] as a cloud infrastructure shared by several organizations to support a specific community) and a supply-chain cloud service (where an enterprise opens up its cloud services to specific business partners). What are examples of private cloud services? There are examples of actual private cloud services, and there are examples of the term being abused to describe something else. Many early private cloud services are custom-built by Type A technology adopters, where an agile compute capability, for example, gives them a competitive market edge. Many enterprises may have shared services that fit the definition in many ways, but don't really have a service-oriented (or self-service) interface, or are only partially automated in implementation. The most promising technologies being used as a basis for private cloud services are virtual servers, virtual storage and virtual networking, together with the automation to make them behave like an infrastructure service. In almost all cases, these are not yet "private cloud" services. As improved automation tools and self-service interfaces emerge, there will be a rapid growth in private cloud services at the infrastructure level. A prominent example of private cloud services using virtualization is self-service development and test environments (for example, using VMware's Lab Manager). Publication Date: 22 October 2009/ID Number: G Page 3 of 6
4 Will private cloud services exist at all levels of the IT stack? Theoretically, yes; but they will be heavily skewed toward system infrastructure services (storage, servers, networking and desktops). Application platform services, and especially application services (software as a service [SaaS] in the cloud), will emerge and mature faster than system infrastructure services that meet all service needs. Enterprises will tend to deploy traditional applications on private cloud system infrastructure services. However, very large enterprises (such as the federal government) may build SaaS solutions for government-specific custom applications shared between government agencies. But these will be the exceptions. What are the basic elements of a private cloud service? There are four key elements to a private cloud service. A private cloud service has a self-service interface (a graphical user interface or an application programming interface) that also presents cost estimates and actuals (metered use). Below the interface, service delivery is managed through automation, and metered use is tracked. Operational processes to support the service are automated as much as possible, reducing the need for manual intervention. And IT resources are pooled and reallocatable in some way (usually through some virtualization technique), ensuring shared and efficient use of resources. How does private cloud computing compare with Gartner's realtime infrastructure? Gartner introduced the real-time infrastructure (RTI) vision in 2001, prior to there being similar vendor strategies such as On Demand (IBM), Adaptive Enterprise (HP) and Dynamic Systems (Microsoft). An RTI architecture is the foundation of private cloud computing for an infrastructure (a policy-based interface producing results that meet service needs, with IT resources automatically provisioned, optimized and maintained to meet those needs). An RTI can support several private cloud services; however, it can also support services that are not necessarily private cloud services (for example, they may not do usage metering, or they may not be entirely self-service). RTI does not equal "private cloud," but RTI and RTI concepts will be required foundations for cloud and private cloud services. RTI remains as Gartner's vision for the architecture of infrastructure and operations. Cloud computing, however, is the vision for the style of various services that will leverage RTI architectures, whether those services are public or private. How does a company start with private cloud computing? Rather than first buying technologies to build a "private cloud," a company needs to understand the services the company provides, its service-level requirements and its current service costs. Not every service is appropriate for the cloud-computing style. Every service is different, and companies should evaluate public cloud offerings to determine if a sufficient service already exists, or will exist soon. Private cloud services should be built if there is sufficient return on investment to warrant building a service, rather than waiting and buying it as a public cloud service later. Will every IT service become a cloud service private or public? No. The cloud-computing style is ideal for services that are relatively standardized, common among other businesses, not business differentiators, not customized and separate from the end customers. The goal for these services is to eliminate unneeded customizations, and make them Publication Date: 22 October 2009/ID Number: G Page 4 of 6
5 more independent from the business, with a standard interface that abstracts the details of the service from the business the cloud-computing style. There are other services that IT organizations provide that might be business differentiators, that might change based on business change, and that tend to be heavily customized. The goal for these services is to improve integration and intimacy between the service and the business, and to enable dynamic change. These services are not suited for cloud computing, although they may leverage private or public cloud services deeper in their supply chain (for example, for storage backup). How will private cloud services evolve? At a high level, a private cloud service will go through three stages: An early private cloud service will tend to be stand-alone, monolithic and customized due to lack of packaged technologies. Over time, more private cloud services will be built using packaged technologies and add-ons. Private cloud services will become more shared and layered in a large enterprise (two private cloud services using a lower-level private cloud service, for example). As technologies become more common and standards improve, hybrid models will become possible, where a private cloud can federate with public cloud services (for example, "overdrafting" of server resources during peaks). During this stage, enterprises will have a fluid choice of staying fully private, going fully public, or retaining a hybrid model. RECOMMENDED READING "Private Cloud Computing: The Steppingstone to the Cloud" "Five Refining Attributes of Public and Private Cloud Computing" "The Spectrum of Public-to-Private Cloud Computing" "Cloud Computing Doesn't Require Massive Providers" Publication Date: 22 October 2009/ID Number: G Page 5 of 6
6 REGIONAL HEADQUARTERS Corporate Headquarters 56 Top Gallant Road Stamford, CT U.S.A European Headquarters Tamesis The Glanty Egham Surrey, TW20 9AW UNITED KINGDOM Asia/Pacific Headquarters Gartner Australasia Pty. Ltd. Level 9, 141 Walker Street North Sydney New South Wales 2060 AUSTRALIA Japan Headquarters Gartner Japan Ltd. Aobadai Hills, 6F 7-7, Aobadai, 4-chome Meguro-ku, Tokyo JAPAN Latin America Headquarters Gartner do Brazil Av. das Nações Unidas, andar World Trade Center São Paulo SP BRAZIL Publication Date: 22 October 2009/ID Number: G Page 6 of 6
Private Cloud Computing: An Essential Overview
Research Publication Date: 23 November 2010 ID Number: G00209000 Private Cloud Computing: An Essential Overview Thomas J. Bittman Private cloud computing requires strong leadership and a strategic plan
Key Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
The What, Why and When of Cloud Computing
Research Publication Date: 4 June 2009 ID Number: G00168582 The What, Why and When of Cloud Computing David Mitchell Smith, Daryl C. Plummer, David W. Cearley Cloud computing continues to gain visibility.
Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing
Research Publication Date: 22 February 2010 ID Number: G00174046 Vendor Focus for IBM Global Services: Consulting Services for Cloud Computing Susan Tan Amid the hype and buzz of cloud computing are very
For cloud services to deliver their promised value, they must be underpinned by effective and efficient processes.
Research Publication Date: 15 October 2010 ID Number: G00208009 ITIL 'in the Cloud' George Spafford, Ed Holub The cloud-computing delivery model is generating a lot of interest from organizations wishing
Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products
Research Publication Date: 10 December 2008 ID Number: G00163195 Cost Optimization: Three Steps to Saving Money on Maintenance and Support for Network Security Products Lawrence Orans, Greg Young Most
Deliver Process-Driven Business Intelligence With a Balanced BI Platform
Research Publication Date: 12 April 2006 ID Number: G00139377 Deliver Process-Driven Business Intelligence With a Balanced BI Platform Kurt Schlegel To enable process-driven business intelligence, IT organizations
Cloud, SaaS, Hosting and Other Off-Premises Computing Models
Research Publication Date: 8 July 2008 ID Number: G00159042 Cloud, SaaS, Hosting and Other Off-Premises Computing Models Yefim V. Natis, Nicholas Gall, David W. Cearley, Lydia Leong, Robert P. Desisto,
IT Operational Considerations for Cloud Computing
Research Publication Date: 13 June 2008 ID Number: G00157184 IT Operational Considerations for Cloud Computing Donna Scott Cloud computing market offerings increase the options available to source IT services.
2010 FEI Technology Study: CPM and BI Show Improvement From 2009
Research Publication Date: 22 March 2010 ID Number: G00175233 2010 FEI Technology Study: CPM and BI Show Improvement From 2009 John E. Van Decker Many organizations recognize that current financial management
When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud
Industry Research Publication Date: 3 May 2010 ID Number: G00175030 When to Use Custom, Proprietary, Open-Source or Community Source Software in the Cloud Massimiliano Claps, Andrea Di Maio Cloud computing
Key Issues for Business Intelligence and Performance Management Initiatives, 2008
Research Publication Date: 14 March 2008 ID Number: G00156014 Key Issues for Business Intelligence and Performance Management Initiatives, 2008 Kurt Schlegel The Business Intelligence and Performance Management
Research Agenda and Key Issues for Converged Infrastructure, 2006
Research Publication Date: 20 July 2006 ID Number: G00141507 Research Agenda and Key Issues for Converged Infrastructure, 2006 Sylvain Fabre Gartner's research will cover fixed-mobile convergence, the
Gartner Updates Its Definition of IT Infrastructure Utility
Research Publication Date: 23 April 2004 ID Number: M-22-2393 Gartner Updates Its Definition of IT Infrastructure Utility Claudio Da Rold Our new definition of IT infrastructure utility clears away some
Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality
Research Publication Date: 4 November 2008 ID Number: G00162793 Microsoft's Cloud Vision Reaches for the Stars but Is Grounded in Reality David Mitchell Smith, Neil MacDonald At Professional Developers
The Current State of Agile Method Adoption
Research Publication Date: 12 December 2008 ID Number: G00163591 The Current State of Agile Method Adoption David Norton As the pace of agile adoption increases, development organizations must understand
Eight Critical Forces Shape Enterprise Data Center Strategies
Research Publication Date: 8 February 2007 ID Number: G00144650 Eight Critical Forces Shape Enterprise Data Center Strategies Rakesh Kumar Through 2017, infrastructure and operations managers, architects
IT asset management (ITAM) will proliferate in midsize and large companies.
Research Publication Date: 2 October 2008 ID Number: G00161024 Trends on Better IT Asset Management Peter Wesche New exiting trends will lead to a higher adoption of asset management methodologies. Tighter
The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools
Research Publication Date: 13 January 2011 ID Number: G00210132 The Value of Integrating Configuration Management Databases With Enterprise Architecture Tools Ronni J. Colville, Patricia Adams As configuration
Business Intelligence Platform Usage and Quality Dynamics, 2008
Research Publication Date: 2 July 2008 ID Number: G00159043 Business Intelligence Platform Usage and Quality Dynamics, 2008 James Richardson This report gives results from a survey of attendees at Gartner's
Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students
Industry Research Publication Date: 26 January 2010 ID Number: G00172722 Case Study: New South Wales State Department of Education Adopts Gmail for 1.2 Million Students Steve Bittinger Australia's New
Iron Mountain's acquisition of Mimosa Systems addresses concerns from prospective customers who had questions about Mimosa's long-term viability.
Research Publication Date: 22 March 2010 ID Number: G00175194 Iron Mountain Acquires Mimosa Systems Sheila Childs, Kenneth Chin, Adam W. Couture Iron Mountain offers a portfolio of solutions for cloud-based
The Five Competencies of MRM 'Re-' Defined
Research Publication Date: 14 March 2008 ID Number: G00155835 The Five Competencies of MRM 'Re-' Defined Kimberly Collins This research details the five key competencies of marketing resource management
The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption
Research Publication Date: 3 February 2009 ID Number: G00164356 The Hype Around an Integrated Talent Management Suite Outpaces Customer Adoption James Holincheck Gartner surveyed 123 customer references
Key Issues for Data Management and Integration, 2006
Research Publication Date: 30 March 2006 ID Number: G00138812 Key Issues for Data Management and Integration, 2006 Ted Friedman The effective management and leverage of data represent the greatest opportunity
The EA process and an ITG process should be closely linked, and both efforts should leverage the work and results of the other.
Research Publication Date: 4 April 2008 ID Number: G00155260 Integrate EA and IT Governance s Betsy Burton, R. Scott Bittler, Cassio Dreyfuss In many organizations, we find that IT governance (ITG) initiatives
Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships
Research Publication Date: 26 February 2008 ID Number: G00154838 Tactical Guideline: Minimizing Risk in E-Mail Hosting Relationships Matthew W. Cain This report discusses the often hidden risks in moving
IT Architecture Is Not Enterprise Architecture
Research Publication Date: 17 November 2010 ID Number: G00206910 IT Architecture Is Not Enterprise Architecture Bruce Robertson Many enterprise architecture (EA) teams and their stakeholders still use
Business Intelligence Focus Shifts From Tactical to Strategic
Research Publication Date: 22 May 2006 ID Number: G00139352 Business Intelligence Focus Shifts From Tactical to Strategic Betsy Burton, Lee Geishecker, Kurt Schlegel, Bill Hostmann, Tom Austin, Gareth
The IT Service Desk Market Is Ready for SaaS
Research Publication Date: 17 April 2009 ID Number: G00166526 The IT Service Desk Market Is Ready for SaaS David M. Coyle The IT service desk market is well-positioned to use the software-as-a-service
Gartner Clarifies the Definition of the Term 'Enterprise Architecture'
Research Publication Date: 12 August 2008 ID Number: G00156559 Gartner Clarifies the Definition of the Term 'Enterprise Architecture' Anne Lapkin, Philip Allega, Brian Burke, Betsy Burton, R. Scott Bittler,
Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in
Research Publication Date: 15 March 2011 ID Number: G00210952 Clients That Don't Segment Their Network Infrastructure Will Have Higher Costs and Increased Vendor Lock-in Tim Zimmerman Enterprises must
Best Practices for Confirming Software Inventories in Software Asset Management
Research Publication Date: 24 August 2009 ID Number: G00167067 Best Practices for Confirming Software Inventories in Software Asset Management Peter Wesche, Jane B. Disbrow This research discusses the
Data in the Cloud: The Changing Nature of Managing Data Delivery
Research Publication Date: 1 March 2011 ID Number: G00210129 Data in the Cloud: The Changing Nature of Managing Data Delivery Eric Thoo Extendible data integration strategies and capabilities will play
Real-Time Decisions Need Corporate Performance Management
Research Publication Date: 26 April 2004 ID Number: COM-22-3674 Real-Time Decisions Need Corporate Performance Management Frank Buytendijk, Brian Wood, Mark Raskino The real-time enterprise model depends
Toolkit: Reduce Dependence on Desk-Side Support Technicians
Gartner for IT Leaders Publication Date: 23 April 2007 ID Number: G00147075 Toolkit: Reduce Dependence on Desk-Side Support Technicians David M. Coyle, Terrence Cosgrove The IT service desk and PC life
Research. Mastering Master Data Management
Research Publication Date: 25 January 2006 ID Number: G00136958 Mastering Master Data Management Andrew White, David Newman, Debra Logan, John Radcliffe Despite vendor claims, master data management has
Roundup of Business Intelligence and Information Management Research, 1Q08
Gartner for IT Leaders Publication Date: 2 May 2008 ID Number: G00157226 Roundup of Business Intelligence and Information Management Research, 1Q08 Bill Hostmann This document provides a roundup of our
Discovering the Value of Unified Communications
Research Publication Date: 12 February 2007 ID Number: G00144673 Discovering the Value of Unified Communications Bern Elliot, Steve Cramoysan Unified communications represent a broad range of new solutions
BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle
Research Publication Date: 15 February 2008 ID Number: G00155026 BEA Customers Should Seek Contractual Protections Before Acquisition by Oracle Peter Wesche, Jane B. Disbrow Oracle has announced an agreement
User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009
Dataquest Publication Date: 23 February 2009 ID Number: G00165376 User Survey Analysis: Usage Plans for SaaS Application Software, France, Germany and the U.K., 2009 Chris Pang Gartner surveyed nearly
Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process
Research Publication Date: 26 October 2010 ID Number: G00207031 Integrated Marketing Management Aligns Executional, Operational and Analytical Processes in a Closed-Loop Process Kimberly Collins This research
2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities
Research Publication Date: 23 July 2009 ID Number: G00168896 2009 FEI Technology Study: CPM and BI Pose Challenges and Opportunities John E. Van Decker Many organizations recognize that existing financial
Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users
Research Publication Date: 17 October 2006 ID Number: G00144061 Responsible Vulnerability Disclosure: Guidance for Researchers, Vendors and End Users Amrit T. Williams, John Pescatore, Paul E. Proctor
IAM can utilize SIEM event data to drive user and role life cycle management and automate remediation of exception conditions.
Research Publication Date: 1 September 2009 ID Number: G00161012 SIEM and IAM Technology Integration Mark Nicolett, Earl Perkins Integration of identity and access management (IAM) and security information
Managing IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets
Research Publication Date: 31 July 2009 ID Number: G00169664 Knowledge Management and Enterprise Information Management Are Both Disciplines for Exploiting Information Assets Regina Casonato This research
Now Is the Time for Security at the Application Level
Research Publication Date: 1 December 2005 ID Number: G00127407 Now Is the Time for Security at the Application Level Theresa Lanowitz Applications must be available, useful, reliable, scalable and, now
Cloud IaaS: Service-Level Agreements
G00210096 Cloud IaaS: Service-Level Agreements Published: 7 March 2011 Analyst(s): Lydia Leong Cloud infrastructure-as-a-service (IaaS) providers typically offer SLAs that cover the various elements of
Emerging PC Life Cycle Configuration Management Vendors
Research Publication Date: 20 January 2011 ID Number: G00209766 Emerging PC Life Cycle Configuration Management Vendors Terrence Cosgrove Although the PC configuration life cycle management (PCCLM) market
The Seven Building Blocks of MDM: A Framework for Success
Research Publication Date: 11 October 2007 ID Number: G00151496 The Seven Building Blocks of MDM: A Framework for Success John Radcliffe Gartner's Seven Building Blocks of Master Data Management (MDM)
Document the IT Service Portfolio Before Creating the IT Service Catalog
Research Publication Date: 8 January 2009 ID Number: G00163200 Document the IT Service Portfolio Before Creating the IT Service Catalog Debra Curtis, Kris Brittain IT service portfolios and IT service
Governance Is an Essential Building Block for Enterprise Information Management
Research Publication Date: 18 May 2006 ID Number: G00139707 Governance Is an Essential Building Block for Enterprise Information Management David Newman, Debra Logan Organizations are seeking new ways
How To Create A Cloud Computing System
G00230221 Five Cloud Computing Trends That Will Affect Your Cloud Strategy Through 2015 Published: 10 February 2012 Analyst(s): David W. Cearley, David Mitchell Smith In this Impact Assessment, we focus
How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits
Research Publication Date: 13 June 2008 ID Number: G00158605 How Eneco's Enterprisewide BI and Performance Management Initiative Delivered Significant Business Benefits Nigel Rayner Eneco was faced with
Overcoming the Gap Between Business Intelligence and Decision Support
Research Publication Date: 9 April 2009 ID Number: G00165169 Overcoming the Gap Between Business Intelligence and Decision Support Rita L. Sallam, Kurt Schlegel Although the promise of better decision
From Secure Virtualization to Secure Private Clouds
Research Publication Date: 13 October 2010 ID Number: G00208057 From Secure Virtualization to Secure Private Clouds Neil MacDonald, Thomas J. Bittman As enterprises move beyond virtualizing their data
Make the maturity model part of the effort to educate senior management, so they understand the phases of the EIM journey.
Research Publication Date: 5 December 2008 ID Number: G00160425 Gartner Introduces the EIM Maturity Model David Newman, Debra Logan Organizations cannot implement enterprise information management (EIM)
2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase
Research Publication Date: 20 April 2010 ID Number: G00176029 2010 Gartner FEI Technology Study: Planned Shared Services and Outsourcing to Increase John E. Van Decker, Cathy Tornbohm This Gartner Financial
What to Consider When Designing Next-Generation Data Centers
Research Publication Date: 10 September 2010 ID Number: G00201044 What to Consider When Designing Next-Generation Data Centers David J. Cappuccio Leading-edge data centers are designed for flexibility,
Government 2.0 is both citizen-driven and employee-centric, and is both transformational and evolutionary.
Industry Research Publication Date: 11 November 2009 ID Number: G00172423 Government 2.0: Gartner Definition Andrea Di Maio Given the increasing confusion and hype surrounding Government 2.0, it is important
Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
Successful EA Change Management Requires Five Key Elements
Research Publication Date: 26 December 2007 ID Number: G00153908 Successful EA Change Management Requires Five Key Elements Richard Buchanan Change, in all its many aspects, is a critical aspect of the
Gartner Defines Enterprise Information Architecture
Research Publication Date: 20 February 2008 ID Number: G00154071 Gartner Defines Enterprise Information Architecture David Newman, Nicholas Gall, Anne Lapkin As organizations look for new ways to exploit
An outline of the five critical components of a CRM vision and how they contribute to an enterprise's CRM success
Research Publication Date: 1 March 2007 ID Number: G00146362 How to Create a Powerful CRM Vision Gene Alvarez This research provides: Guidance on how to develop a CRM vision An outline of the five critical
Containers and Modules: Is This the Future of the Data Center?
Research Publication Date: 8 April 2011 ID Number: G00211139 Containers and Modules: Is This the Future of the Data Center? David J. Cappuccio Modular and container-based data centers have emerged as yet
Organizations Must Employ Effective Data Security Strategies
Research Publication Date: 30 August 2005 ID Number: G00123639 Organizations Must Employ Effective Data Security Strategies Rich Mogull Organizations can best protect data through a hierarchical data security
Repurposing Old PCs as Thin Clients as a Way to Save Money
Research Publication Date: 30 March 2009 ID Number: G00166341 Repurposing Old PCs as Thin Clients as a Way to Save Money Mark A. Margevicius, Stephen Kleynhans Tough economic times are forcing customers
Consider Identity and Access Management as a Process, Not a Technology
Research Publication Date: 2 September 2005 ID Number: G00129998 Consider and Management as a Process, Not a Technology Earl L. Perkins, Ant Allan This Research Note complements earlier Gartner research
ERP, SCM and CRM: Suites Define the Packaged Application Market
Research Publication Date: 25 July 2008 ID Number: G00158827 ERP, SCM and CRM: Suites Define the Packaged Application Market Yvonne Genovese, Jeff Woods, James Holincheck, Nigel Rayner, Michael Maoz Users
How BPM Can Enhance the Eight Building Blocks of CRM
Research Publication Date: 6 April 2007 ID Number: G00146588 How BPM Can Enhance the Eight Building Blocks of CRM Marc Kerremans, Jim Davies Business process management (BPM) should complement an organization's
Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing
Research Publication Date: 19 July 2011 ID Number: G00214537 Case Study: Mohawk Fine Papers Uses a CSB to Ease Adoption of Cloud Computing Benoit J. Lheureux Paper manufacturer Mohawk Fine Papers needed
CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance
Industry Research Publication Date: 1 May 2008 ID Number: G00156708 CDOs Should Use IT Governance and Risk Compliance Management to Advance Compliance Barry Runyon Care delivery organizations (CDOs) are
Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game
Research Publication Date: 23 November 2010 ID Number: G00208615 Case Study: Innovation Squared: The Department for Work and Pensions Turns Innovation Into a Game Brian Burke, Mary Mesaglio The U.K.'s
Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost
G00238815 Modify Your Storage Backup Plan to Improve Data Management and Reduce Cost Published: 4 October 2012 Analyst(s): Dave Russell IT leaders and storage managers must rethink their backup procedures
Agenda for Supply Chain Strategy and Enablers, 2012
G00230659 Agenda for Supply Chain Strategy and Enablers, 2012 Published: 23 February 2012 Analyst(s): Michael Dominy, Dana Stiffler When supply chain executives establish the right strategies and enabling
2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise
Research Publication Date: 23 July 2009 ID Number: G00169733 2009 Gartner FEI Technology Study: XBRL in the U.S. Enterprise John E. Van Decker Extensible Business Reporting Language (XBRL) will be a requirement
In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand
Research Publication Date: 18 August 2011 ID Number: G00215378 In the North American E-Signature Market, SaaS Offerings Are Increasingly in Demand Gregg Kreizman Enterprises are becoming increasing comfortable
The Next Generation of Functionality for Marketing Resource Management
G00212759 The Next Generation of Functionality for Marketing Resource Management Published: 11 May 2011 Analyst(s): Kimberly Collins This research defines the next generation of marketing resource management
