KeywordsCloud computing vendors service vendors cloud computing providing
The process of terminating a contractual relationship with a service provider, is always more difficult than any other interaction with them, which is a natural consequence of business dynamics. Typically, a service provider does not provide a seamless transfer process that transfers the business to a competitor. Vendor lock-in is a common problem in many cloud deployment projects. The process of terminating a contractual relationship with a service provider, is always more difficult than any other interaction with them, which is a natural consequence of business dynamics. Typically, a service provider does not provide a seamless transfer process that transfers the business to a competitor. Vendor lock-in is a common problem in many cloud deployment projects.
The lack of self-discipline of the service vendors may be to retain customers, one of the main methods of setting up a barrier consciously is security control. The purpose of security control is to restrict access to data, so the service vendors will be able to use security requirements as an excuse to be unable or unwilling to provide critical data. To achieve a smooth transition of the manufacturer's changes. So when thinking about going into cloud computing, you should do your homework, and don't blindly and hastily carry out cloud computing projects.
Cloud computing vendor lock-in is mainly divided into two types, namely data locking and API locking. Data locking occurs when a cloud vendor displays data for a demo, but not for further analysis, Aggregation, or even storage, returns the original data. This basically means that the manufacturer is tethered to the specific data. The API lockdown is even worse. API locking means that the cloud computing vendor API has become an important component of the enterprise's application architecture. Once this happens, All the changes that depend on the manufacturer are strictly limited.
Fortunately, however, these two locks can be avoided by careful planning. First of all, do not put very valuable content into the cloud. A simpler understanding is that any business-critical function sits behind the firewall of the enterprise and is secured. You might want to integrate these important business functions with some of the more mundane data features of the cloud. How do you do that? You can follow the principle of collecting APIs from external cloud resources first. Then create a buffer layer to ensure that the rest of the enterprise's architecture is secure, Stay away from API locking. Exposes critical internal resource data through a proprietary API. Finally, through the buffer layer, use the internal API to aggregate your proprietary APIs.
The premise of these practices is that before the contract is signed, the IT department has been involved in the project of cloud computing. But in fact, many projects do not do so, once the partnership is established, the reality will force companies to be subject to manufacturers and can not easily change manufacturers. It is challenging to ask for additional budget after signing an agreement. , but this does not mean that the enterprise has completely lost the right to get rid of the manufacturer's lock-in.
For example, the periodic http://www.aliyun.com/zixun/aggregation/20522.html "> Test data Export function will help users understand the actual export operation." In addition, Open standards can also be rigorously enforced in new consolidation. Vendors may not be required to use open standards within their products or services (at least not immediately after establishing a contractual relationship), but they can be forced to discuss new consolidation.
Cloud computing vendors are clearly unwilling to provide a simple platform-transfer approach. However, it should be noted that these manufacturers may limit the company's choice of new vendors, or at least to change the manufacturers to set up barriers, Therefore, the process of testing a clean transfer at the start of a project is a very reliable strategy to avoid cloud vendor lock-in on the development path.
Now, the world's leading IT standards organization, the Open group, has also released new cloud computing guides to help companies address portability and interoperability issues to ensure that companies get the maximum ROI from cloud computing investments.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.