With a clearly defined wish list, organizations must then
approach the cloud transition in the following four phases:
1. Strategic Preparation
In this initial phase, IT decision makers will determine the
appropriate cloud computing strategy, asking questions
about architecture and security, as well as about objectives.
Colleges and universities should work with experts who have
extensive experience in multiple technology areas, such as
virtualization, service orchestration, automated provisioning,
and the security that underpins network architectures.
The costs, benefits, and operational changes required to
successfully migrate to a cloud–computing model should
also be evaluated, including both the current and desired
services management approach. A thorough analysis helps
align business results with subsequent cloud architectural
development, tools, process integration, and implementation.
Strategic preparation should also target security. University IT
experts should evaluate their cloud services and architecture
security risks, focusing on protecting access and providing
on-demand security options within a services catalog for their
users. In addition, your strategy should take into account your
cloud-computing evolution and post-deployment activities in
every stage: strategy, planning and design, implementation,
and optimization.
2. Planning and Design
When undertaking a transition to cloud computing, strategic
planning and design can help reduce the time to successful
deployment and operation of complex cloud models. This
phase requires expert coordination among the members of
your team, your partners, and other vendors, as well as a
detailed architecture design, data-center–specific expertise,
and security designed from end to end.
The resulting designs and plans — including, for example, an
end-to-end architecture blueprint, a migration roadmap, a
common control framework, a security technology framework,
physical safety and security, and your future cloud services
evolution — should link back to your strategy and lay the
foundation for subsequent implementation and integration.
3. Implementation
In order to reduce risk during a transition to cloud computing,
college and university IT organizations need to have someone
with experience in providing a virtualized architecture, as well
as integrated tools, a facilities plan, orchestration integration,
workload migration, and staging and validation activities
prior to full-scale implementation. This phase also involves
implementing the security technology architecture, the
security portal design, automated audit, and physical safety
and security designs.
Proven methodologies, best practices, and deep knowledge
of the core systems within the cloud environment can facilitate
a smooth migration from your existing environment to a cloud
utility computing architecture, while helping ensure adherence
to plans and enabling on-time delivery of a fully implemented
cloud-computing model. During this implementation stage,
knowledge transfer should be an ongoing process, providing
operational confidence for in-house experts.
4. Optimization
Optimization of the cloud model, which can accelerate
adoption, is the point where you can maximize the true benefits
of cloud computing: lower operating and capital expenses,
increased business agility and responsiveness, and scalability.
This is done through activities such as:
• Architectural reviews
• Security audits
• Cost-reduction exercises
• Process improvements
• Tool customization
• Post-deployment or Day 2 support
Cloud 101: Developing a Cloud-Computing
Strategy for Higher Education
White Paper
Cloud Case Study: Expanded Capabilities with
Virtualized Infrastructure
At the Chinese University of Hong Kong (CUHK), the
IT team required faster and more flexible provisioning
of resources. By virtualizing operations with Cisco
®
Data Center Business Advantage Architecture, CUHK
achieved more efficient allocation of computing
resources and significant expansion of data center
capability within a constrained physical space.
5 © 2012 Cisco and/or its affiliates. All rights reserved.