Download - From Shadow IT to Empowered IT
![Page 1: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/1.jpg)
From Shadow IT to Empowered ITUnshackling your Developers’ Creativity
Dimuthu LeelarathneSenior Architect - WSO2,Inc
![Page 2: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/2.jpg)
Agenda
2
Shadow IT
Reference Architecture
Empowered IT
![Page 3: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/3.jpg)
Business challenges
3
- Complex biz requirements- Wider problem space- Rapidly changing
- Increasing Velocity
Picture Credit : http://www.latimes.com/sports/
![Page 4: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/4.jpg)
Technology challenges
4
![Page 5: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/5.jpg)
Relationship with IT
5
2 days to create a
user
½ day to reset a
password
3 days to create a
database
1 week to provision
a VMruntime policies
devops policies
Picture Credit : http://web.zizinya.com/blog/
![Page 6: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/6.jpg)
Result – Shadow IT
6
Picture Credit : http://www.apriso.com/blog/wp-content/uploads/2012/08/Shadow_IT_continued.jpg/
![Page 7: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/7.jpg)
7
Shadow IT is IT activity that occurs outside of IT. Shadow IT is growing in many organizations driven by consumerized technology, mobility, the availability of cloud solutions ……
![Page 8: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/8.jpg)
Shadow IT – today
8
![Page 9: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/9.jpg)
9
People are tech savvy
![Page 10: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/10.jpg)
Shadow IT Usage by Employees
10
http://www.mcafee.com/hk/resources/reports/rp-six-trends-security.pdf
![Page 11: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/11.jpg)
Is it new ?
11
Picture Credit : http://metsys.irislink.com/
Export to ….
![Page 12: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/12.jpg)
12
Story : Protecting spreadsheets
![Page 13: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/13.jpg)
Shadow IT in Software Development
13
Dev Teams
Biz Users
IT
I have a solution, but can’t deploy
I need a quick solution for problem ‘x’
Not compliant with the policies
I can fund and provide hosting.
?..#@$%
CFOCIO
♬♪
1
2
3
4
![Page 14: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/14.jpg)
Agile innovation labs
14
- Applications developed in innovation labs- Driven by need- Driven by speed - Driven by knowledge - Meets business and technology demand
![Page 15: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/15.jpg)
Lifecycle of an (unmanaged) app
In Production Maintenance
App App
APP
App
App
App
Create
6 – 9 months
Dev Teams IT
Biz Users
Managed apps
{integrate}
![Page 16: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/16.jpg)
16
35% of enterprise IT expenditures will happen outside of the corporate IT budget in 2015.
![Page 17: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/17.jpg)
Addressing Shadow IT in Software Development
17
![Page 18: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/18.jpg)
Solution to facilitate
18
Quick release cycles
Agile, iterative process
Accept the creative
experimen-tation
Empower the dev groups
Monitored GovernedSecured
AgileInfra
![Page 19: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/19.jpg)
Solution provides
19
Self service
Workflow driven /
Automated/ Monitored
Polyglot programming
model
Heterogynous runtimes
API drivenStore fronts
Template driven
![Page 20: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/20.jpg)
Roadmap for empowered IT
20
- Access to (your) cloud- Private cloud (privately/publicly hosted)- Public cloud
- Link ALM and dev tools with the cloud- Expose the services as APIs, list APIs to subscribe- Create your project templates- Develop and publish apps- Monitor development activities and usage
![Page 21: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/21.jpg)
Reference Architecture
21
![Page 22: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/22.jpg)
Implementation
22
Business dynamics have changed.Business dynamics have changed.
![Page 23: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/23.jpg)
EnterpriseApps
Multiple Project Teams
● Collaborate
● Create
● Develop
● Deploy and host
Platform
● Shared
● Elastic
● Multi-tenant
● Self-service
● PaaSUtilizing
● APIS
● Tools
● Infrastructure
![Page 24: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/24.jpg)
Implementation, integrated
24
![Page 25: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/25.jpg)
Streamlined Governed ALM
25
![Page 26: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/26.jpg)
Self service, template driven, automated
26
![Page 27: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/27.jpg)
CXO/EA dashboards, monitor, measure
27
![Page 28: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/28.jpg)
Lifecycle, manage, control, advertise
28
![Page 29: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/29.jpg)
Runtime, cloud enabled, polyglot
29
![Page 30: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/30.jpg)
30
Runtime, cloud enabled, polyglot
![Page 31: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/31.jpg)
WSO2 Cloud Platform
31
![Page 32: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/32.jpg)
Connect Old IT with New IT
32
![Page 33: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/33.jpg)
33
Connected, internally and externally
![Page 34: From Shadow IT to Empowered IT](https://reader033.vdocument.in/reader033/viewer/2022052506/557d6045d8b42ae1438b4fa8/html5/thumbnails/34.jpg)
Reference architecture, cont.
34