from shadow it to empowered it
DESCRIPTION
Project teams often use shadow IT, instead of the much slower traditional IT, to facilitate rapidly changing complex business requirements and quick release cycles. As a result, an unmanaged, ungoverned set of IT solutions reside in enterprises that keeps CIOs awake at night. This presenation also explains how enterprises can leverage cloud-enabled ALM frameworks to build managed and governed empowered IT that enables quick release cycles and template-driven rapid development, empowering developers to develop, test, and release apps in a governed secured manner.TRANSCRIPT
![Page 1: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/1.jpg)
From Shadow IT to Empowered ITUnshackling your Developers’ Creativity
Dimuthu LeelarathneSenior Architect - WSO2,Inc
![Page 2: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/2.jpg)
Agenda
2
Shadow IT
Reference Architecture
Empowered IT
![Page 3: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/3.jpg)
Business challenges
3
- Complex biz requirements- Wider problem space- Rapidly changing
- Increasing Velocity
Picture Credit : http://www.latimes.com/sports/
![Page 4: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/4.jpg)
Technology challenges
4
![Page 5: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/5.jpg)
Relationship with IT
5
2 days to create a
user
½ day to reset a
password
3 days to create a
database
1 week to provision
a VMruntime policies
devops policies
Picture Credit : http://web.zizinya.com/blog/
![Page 6: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/6.jpg)
Result – Shadow IT
6
Picture Credit : http://www.apriso.com/blog/wp-content/uploads/2012/08/Shadow_IT_continued.jpg/
![Page 7: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/7.jpg)
7
Shadow IT is IT activity that occurs outside of IT. Shadow IT is growing in many organizations driven by consumerized technology, mobility, the availability of cloud solutions ……
![Page 8: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/8.jpg)
Shadow IT – today
8
![Page 9: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/9.jpg)
9
People are tech savvy
![Page 10: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/10.jpg)
Shadow IT Usage by Employees
10
http://www.mcafee.com/hk/resources/reports/rp-six-trends-security.pdf
![Page 11: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/11.jpg)
Is it new ?
11
Picture Credit : http://metsys.irislink.com/
Export to ….
![Page 12: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/12.jpg)
12
Story : Protecting spreadsheets
![Page 13: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/13.jpg)
Shadow IT in Software Development
13
Dev Teams
Biz Users
IT
I have a solution, but can’t deploy
I need a quick solution for problem ‘x’
Not compliant with the policies
I can fund and provide hosting.
?..#@$%
CFOCIO
♬♪
1
2
3
4
![Page 14: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/14.jpg)
Agile innovation labs
14
- Applications developed in innovation labs- Driven by need- Driven by speed - Driven by knowledge - Meets business and technology demand
![Page 15: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/15.jpg)
Lifecycle of an (unmanaged) app
In Production Maintenance
App App
APP
App
App
App
Create
6 – 9 months
Dev Teams IT
Biz Users
Managed apps
{integrate}
![Page 16: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/16.jpg)
16
35% of enterprise IT expenditures will happen outside of the corporate IT budget in 2015.
![Page 17: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/17.jpg)
Addressing Shadow IT in Software Development
17
![Page 18: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/18.jpg)
Solution to facilitate
18
Quick release cycles
Agile, iterative process
Accept the creative
experimen-tation
Empower the dev groups
Monitored GovernedSecured
AgileInfra
![Page 19: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/19.jpg)
Solution provides
19
Self service
Workflow driven /
Automated/ Monitored
Polyglot programming
model
Heterogynous runtimes
API drivenStore fronts
Template driven
![Page 20: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/20.jpg)
Roadmap for empowered IT
20
- Access to (your) cloud- Private cloud (privately/publicly hosted)- Public cloud
- Link ALM and dev tools with the cloud- Expose the services as APIs, list APIs to subscribe- Create your project templates- Develop and publish apps- Monitor development activities and usage
![Page 21: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/21.jpg)
Reference Architecture
21
![Page 22: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/22.jpg)
Implementation
22
Business dynamics have changed.Business dynamics have changed.
![Page 23: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/23.jpg)
EnterpriseApps
Multiple Project Teams
● Collaborate
● Create
● Develop
● Deploy and host
Platform
● Shared
● Elastic
● Multi-tenant
● Self-service
● PaaSUtilizing
● APIS
● Tools
● Infrastructure
![Page 24: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/24.jpg)
Implementation, integrated
24
![Page 25: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/25.jpg)
Streamlined Governed ALM
25
![Page 26: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/26.jpg)
Self service, template driven, automated
26
![Page 27: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/27.jpg)
CXO/EA dashboards, monitor, measure
27
![Page 28: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/28.jpg)
Lifecycle, manage, control, advertise
28
![Page 29: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/29.jpg)
Runtime, cloud enabled, polyglot
29
![Page 30: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/30.jpg)
30
Runtime, cloud enabled, polyglot
![Page 31: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/31.jpg)
WSO2 Cloud Platform
31
![Page 32: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/32.jpg)
Connect Old IT with New IT
32
![Page 33: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/33.jpg)
33
Connected, internally and externally
![Page 34: From Shadow IT to Empowered IT](https://reader033.vdocuments.us/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/34.jpg)
Reference architecture, cont.
34