Skip to main content

Economic benefits of Government Cloud Computing



  There are many reasons for government agencies to move from traditional IT infrastructure to Cloud Computing platforms. One of the most cited benefit is the economic model  of  Cloud Computing.

Four distinct mechanisms can generate cost savings for govenment agency and organization:

  • Lowering the opportunity cost of running technology
  • The aibility to shift from capital expenditure to operating expenditure
  • Lowering the total cost of ownership (TCO) of technology
  • Giving organizations the ability to add business value by renewed focus on core activities
Cost saving is the hot topic for most government since the global economic situation around the world.
Historically, there were two discssions that focused on cloud computing cost saving.
      The first was focused on server virtualization and application consolidation on under-utilized resources. Reducing spend on rackspace,network,infrastructure,pooling, powera and datacenter can immediatly generates cost saving.This type of cost saving impact internal investissement which evolved to be called "Private Cloud".Of course, if each government agenciy defines its private cloud computing startegy, they will be a big cost saving for the hall government.
      The second looked at on-demand platforms, purchased over the internet, allowing on-demand services and Pay As You Go model. Developers and internal productions teams didn't have to wait for new infrastructure to be provisioned before their public clouds create new applications.Cost savings for this use-case come from the elimination of capital expenditure CAPEX for internal process and data center resources.

Follow changes that could be made to an agency's cost model :
  • Services and storage become available on demand without the need to financial commitements to purchase infrastructure and maintain it.
  • The cost is transfered from CAPEX to OPEX and so no need to invest in high-cost IT platforms and equipements.
  • Reduction of operating cost by:
    • reducing energy consumption
    • less expense in managing IT services
    • less cost in doing maintenace tasks related to IT equipements and platforms
    • reduse support and maintence contract by transfering legacy systems to new systems
    • reduce the demand for data center resources
    • and finally reducing the Government's carbon footprint.

Comments

Popular posts from this blog

What You Must Know Before Establishing a Recovery Plan ?

In today's rapidly evolving digital landscape, organizations are increasingly adopting the zero trust model, primarily due to the expanding attack surface that leaves critical systems and data exposed. This shift is also fueled by the heightened sophistication of cyber-attacks, which have become more complex and harder to detect, surpassing traditional security measures. Additionally, the existing operating models within organizations are often inconsistent, typically characterized by distributed and siloed environments.    This fragmentation creates vulnerabilities and makes it challenging to implement uniform security protocols. The zero trust model addresses these challenges by assuming that threats exist both inside and outside the network, necessitating continuous verification of all users and devices. Its adoption represents a proactive stance in the ongoing battle against cyber threats, ensuring a more robust and resilient organizational security posture. The Evolution ...

A comprehensive guide to ransomware distribution in VMware environments

In a virtualized on-premises environment based on VMware, ransomware distribution scenarios can be somewhat unique due to the nature of virtualization technology. However, many of the traditional attack vectors still apply. Here are some ransomware distribution scenarios specific to a VMware-based virtualized environment: Phishing Attacks Targeting Administrators: Administrators with access to the VMware environment might receive phishing emails. If they fall for these and their credentials are compromised, attackers can gain access to the virtualized environment. Exploiting Vulnerabilities in VMware Software: If VMware software or the underlying operating system is not kept up-to-date with security patches, vulnerabilities can be exploited by attackers to deliver ransomware into the virtualized environment. Compromised Remote Management Tools: Tools used for remote management of the virtualized environment, such as vSphere, can be a target. If these tools are compromised, attackers ca...

Edge Computing Demystified Book

After a while I'm back and pleased  to share in this post my first book around Edge computing Technologies. Edge computing has been a very hot and interesting topic nowadays for communication service provider and Enterprise so far. Augmented Reality / Virtual Reality, Smart cities, Healthcare, industrial IoT and many others use cases require a change in the way we operate and host application in the cloud.  IA, Big Data and analytics are often used today to understand the behavior of the customer and even the health of services. Real-time and high throughput demand are the characteristic of the new business services. Edge computing technology promises to resolve different challenges and brings compute, storage and bandwidth close to the data source. I tried in ‘the Edge Computing Demystified’ book to explain Edge computing technology referring to different use cases from communication service provider and enterprise industry. I h...