• Partners
  • Results
        • Latest from The Blog

          Managed Network Services

          You rely on the cloud to run your business. What would you do without it? With business-critical software applications and data now in the cloud, networks are the gateway to everything your employees need to do their jobs.  And if a problem causes the network to go down, it can bring your operation to a

          Read More »

          The “IT Contact” Dilemma

          “Oh, yeah I have a contact who can do that.” In today’s world, if your IT contact is your company’s solution, you should be concerned. Do you really want to rely on one person to protect the technology that keeps your company running while cybercrime is at an all-time high and attacks are becoming increasingly

          Read More »

          The imminent danger facing the legal Industry

          Attorney-client privilege extends to client data Attorney-client privilege is what makes a client feel secure from the potential risk of having sensitive information fall into the wrong hands. Unfortunately, client data doesn’t always receive that same luxury. Data breaches in the legal industry are on the rise and most firms are not giving cybersecurity the

          Read More »

          Cybersecurity Awareness Month 2020

          2020 has certainly brought no shortage of changes from 2019 – but one of the biggest changes between last fall and this fall is the amount of time we’re spending at home, in turn using technology to run our business from home. This has opened up pandora’s box when it comes to cybersecurity for both

          Read More »

          What makes healthcare data so valuable to cyber-criminals? The unique risks and results that our digital healthcare systems face.

          When it comes to cybersecurity these days, most people are more concerned about keeping their financial information safer than their health information, even though PHI (Personal Health Information) is significantly more valuable on the black market. When a bad actor obtains the name, birthdate, social security number, and medical history for an individual, not only

          Read More »

          COVID-19 and the Rise of the Virtual Business: The “new normal” of navigating business continuity

          The COVID-19 pandemic has changed business forever. But this isn’t necessarily a bad thing. Successful entrepreneurs and innovators understand that though change is hard—especially when forced upon us—it can be good for strengthening your business.   As quarantines are lifted, the idea of returning to work has shifted as business leaders realize, through this unfortunate

          Read More »

          CLOUDTANGO NAMES WATERLOO-BASED FOXNET INC. ONE OF CANADA’S TOP MANAGED SERVICE PROVIDERS IN 2020

          WATERLOO, ON | FEBRUARY 26, 2020 – FoxNet, a Waterloo-based global IT solution provider, is excited to announce it has been named one of Cloudtango’s Top Managed Service Providers in Canada 2020. The annual list recognizes top-performing Managed Service Providers across the country, spotlighting those who have excelled in support services, customer satisfaction, market growth,

          Read More »

          Secure Remote Workers

          Unfortunately, COVID-19 continues to spread across the globe. Like the rest of the world, we are following updates diligently. Due to this evolving public health situation, cyberthreats, including phishing scams and spam, are spiking as online criminals take advantage of the pandemic. Hackers are setting up malicious websites, posing as reputable sources of information about

          Read More »

          FoxNet Inc Announces Partnership with eSentire to Deliver MDR Services to its Clients

          Waterloo, Ontario – November 5th, 2019 – FoxNet Inc announced it has signed a partnership agreement with eSentire, Inc., the global leader in Managed Detection and Response (MDR), to deliver cybersecurity services to their growing portfolio of clients.  Organizations operate in a world in which their data, infrastructure, endpoints, customers and supply chain partners are distributed everywhere. Category creator

          Read More »

          The Best of Cybersecurity Awareness Month 2019

          Fall makes us think of crisp apples, changing colours, turkey dinners, Halloween candy – but what about cybersecurity? October is Cybersecurity Awareness Month (or #CSAM) and this year the focus was on encouraging all businesses to take action and think proactively about reducing threats. Many global IT leaders and government initiatives shared excellent resources, important

          Read More »

          What are Next-Gen Managed Services?

          Trends in data management, cybersecurity, and cloud-based solutions over the past several years have created a very important need for both SMBs and enterprises – next-gen managed services. IT management has become a lot more than reducing downtime and resolving support tickets. An MSP, or Managed Services Provider, is the solution many companies have been

          Read More »

          BUaaS: Backup as a Service

            Backup as a Service, or BUaaS, is an end to end solution that stores and protects your valuable data. BUaaS bridges the gap between protecting data onsite and protecting data in the cloud, making it an absolutely critical component to any business. Keeping your data safe is imperative for any business. FoxNet’s BUaaS is

          Read More »

          FoxNet Announces Partnership with Rubrik

          For Immediate Release Waterloo, Ontario | November 2, 2018 — FoxNet, a Waterloo-based IT service provider, has joined with cloud management leader Rubrik as a service delivery partner. FoxNet will be using Rubrik to deliver innovative cloud management technology to its clients. FoxNet will offer Rubrik’s secure and dependable Backup-as-a-Service, DR-as-a-Service and Archival-as-a-Service to clients

          Read More »

          FoxNet Partners With Pure Storage To Build Modern Data Solutions

          For Immediate Release WATERLOO, ON | October 31, 2018 – FoxNet, a leading IT services provider, has partnered with Pure Storage Inc., lending its expertise as part of a collaborative initiative to generate faster, smarter data storage solutions for an increasingly data-driven world. Bill Fox, President of FoxNet, says the partnership prepares businesses to gather,

          Read More »

          16th Annual FoxNet Charity Golf Tournament

          FoxNet hosted its 16th annual Golf Tournament on August 23rd in support of Kidsability and Waterloo Region Junior Achievement. Participants enjoyed a wonderful day on the links thanks to FoxNet and their generous sponsors. This year the tournament raised a remarkable $16,000, which will be put to excellent use in helping youth across the Waterloo

          Read More »

          The FoxNet Annual Charity Golf Tourney Raises $16K to Benefit Local Children

          For Immediate Release WATERLOO, ON | August 27, 2018 – FoxNet, a Waterloo-based IT service provider, raised $16,000 during its 16th annual charity golf tournament this month in support of local non-profit organizations. The proceeds from the FoxNet Golf Tournament will support local organizations whose programs empower special needs children and youth to realize their

          Read More »

          Why Good Companies Fail

          Recently, a customer asked me to develop a seminar for his executive team and board of directors on the topic “Why Good Companies Fail.” A fascinating question which begs to be answered. After all, how could good (and even great) companies like Nortel, Kodak, and others fail? Yet somehow they have. Each the leader in

          Read More »

          FoxNet Rides for Mental Health

          “It was early! It was wet! It was a great way to raise money for a cause close to our hearts at FoxNet.” Bill “RPM” Fox The FoxNet team pumped up our bike tires, dusted off our helmets and hit the country roads for Ride Don’t Hide this June.  We are proud of our FoxNet

          Read More »

          Team FoxNet Participating in Ride Don’t Hide

          Mental illness is an issue that will impact all Canadians at some point in their lives, either directly or indirectly. For this reason, we are eager to take part in the Ride Don’t Hide event on June 24th. Our team of 12 (and growing) will join thousands of riders coming together to help put an

          Read More »

          Keys to Successful IoT Implementation

          by William Dupley Introduction A successful military strategy depends on the ability of leadership to identify potential obstacles and barriers and ensure their strategy is agile enough that it can adapt. IoT projects also require in-depth implementation barrier analysis to uncover any potential obstacle that could impact a successful implementation. IoT and OT (Operational Technology)

          Read More »
  • Careers
  • Contact

Hybrid IT: Barriers and Challenges

Share on linkedin
LinkedIn
Share on facebook
Facebook
Share on twitter
Twitter
Share on email
Email
Share on print
Print

by William Dupley 

Last month I talked about what I wished I asked my Cloud Provider before I bought them. This month I will continue to discuss the barriers and challenges to implementing a Hybrid IT Operating Model.

A good military planner spends a great deal of time understanding the obstacles or barriers to achieving a battle’s objectives. The Battle of Vimy Ridge during the First World War is a great example of brilliant military planning. Five months was spent understanding the obstacles of the battlefield and the development of specific tactics to overcome each barrier. For example, a special weapon was developed to enable the destruction of barbed wire. A special offensive technique called creeping barrage was developed to coordinate artillery and infantry into one integrated task force. Extensive training and practice was also exercised by troops in a full simulation of the battle before it was actually undertaken.

Implementing a hybrid IT operating model requires the same level of commitment to uncovering obstacles and barriers and developing new strategies to overcome them, or it will not be successful. The Open Data Center Alliance has recently completed a new document called “Barriers and Challenges to implementing Hybrid IT.” In this document, we have described many categories of barriers that have proven to become substantial obstacles to companies implementing a hybrid IT model. Below is a summary of the barriers that we discussed in this new whitepaper.

 

 

Barrier Examples

Here are a few examples of common barriers that companies have experienced when implementing a hybrid IT operating model.

 

Traditional IT control of IT services

The IT department feels they should remain in control of all IT and partnerships, and they are not willing to share that responsibility with the business.

Resistance to Change

Teams are not keen to change what they know works, and what they are comfortable with.

 

Loyalty to old partnerships

Current partners may have previously added value, but may not have capability in the cloud space, and are holding the organization back.

 

It’s an IT Problem

Executives see cloud as purely in the domain of IT, and want to leave responsibility all centralized to IT. An ancillary challenge is that the business may see IT as getting in the way and would prefer to go ahead without IT’s involvement, getting into engagements which are difficult to integrate, support or exit.

 

Business wants control but not responsibility

Business units want to be able to order and configure services themselves, but not to take accountability for their effectiveness, efficiency, compliance and other aspects (functional & non-functional requirements).

Each of these barriers requires strategic work to overcome. An effective IT transformational plan must include barrier transformation initiative projects as part of IT strategic planning activities. Let’s look at an example of how to overcome just one of the barriers I’ve mentioned above.

 

Problem: Business wants control but not responsibility

Solution:

  • Pre-define (prior to solution research) and communicate rules, expectations and associated accountability. Communicate business application classifications and associated rules.
  • Create pre-defined Hybrid IT compliant services for business to use, with pre-defined partners.
  • Define cloud standards/blueprints/blueprints for business up front.
  • Develop an Enterprise internal Catalogue of services for business to use of externally provided services.
  • Develop an API Catalog of common IT services and data sets that will support citizen integration.
  • IT & business proactively partner in determining functional & non-functional needs, and compliance requirements.

 

The Hybrid IT model must support the “democratization of IT.” A democratized IT model means that anybody can create IT solutions, not just IT. To accomplish this, IT must redesign the current IT operating model to support a democratized IT operating model

 

Conclusion

Hybrid IT can deliver many advantages to an enterprise.  However, to be successful there are a number of changes that the enterprise needs to implement to fully exploit the benefits.  These changes will help to reduce barriers to Hybrid IT adoption. These changes often have to be addressed through a formal Hybrid IT Roadmap that has the Business and IT Executive’s support.

For more information on this topic, I encourage you download and read The Open Data Center Alliance’s Hybrid IT: Barriers & Challenges.


About the Author

Bill Dupley is a Digital Strategist at FoxNet. He has led IT transformation and strategic planning teams for over 50 companies and governments worldwide and bring extensive experience in IT & Business Strategic Planning, IT process design, and enterprise architecture. Bill has held several positions over his career including the Cloud Chief Technologist for Hewlett-Packard Enterprise Canada and Director of Strategy and Business Development for HPE Canada Consulting.

He is a graduate of Ryerson University, a former member of the HPE IT Global SWAT Team, and a member of the Open Data Center Alliance Cloud Maturity Model authorship team. He is dedicated to helping customers equip themselves rapidly for our ever-changing technological world.

 

 

.

Scroll to Top