打印 上一文章 下一文章

Why Compass-Thinking Bias Can Hinder Your Cloud Migration

[複製網址]
1
Individuals of us from the IT community normally have to describe advanced principles in tangible organization phrases. We rely closely on simplifying metaphors: Legacy network connectivity is mapped as “hub and spoke.” Networks are secured using a “castle-and-moat” enclosure. But sometimes those people metaphors might be much too basic, restricting our individual ability (and our CxO colleagues’ skill) to imagine past the established order.

Whenever we explain network interactions, we use the metaphor of compass details: Site visitors on a corporate network managed by means of multiprotocol label-switching (MPLS) runs east/west; visitors hopping the moat (metaphor!) and likely outside the house the corporate network castle operates north/south. It is an old-timey approach to think of community navigation: Targeted traffic in the firm operates side to facet, targeted visitors headed exterior moves up and down.

Above the decades, we IT community users have invested seriously to shield both of those sorts of site visitors. We developed firewalls to surround the whole lot of your corporate network and isolate the east/west targeted visitors in the north/south visitors. We stacked protection components on the moat drawbridge to scale back the risk of compromise and guarantee only fantastic website traffic moves north and south. But those approaches are supposed to safeguard hub-and-spoke styles which, let’s face it, are legacy networks made for an out-of-date technique for do the job.


Photo staff at an office using desktop equipment to connect to locally managed assets - in 1987. With this old-world product, a fiscal analyst completes a spreadsheet and uploads it for the firm FTP server, which, for security’s sake, is backed up nightly. Likewise, a program developer checks in code towards the nearby improvement server repository, where by her colleague can then down load and overview it.

Those get the job done illustrations epitomize regular east/west targeted visitors administration: protected and protected, wherever all movement is controlled in the firewall-protected confines of the company community.


收藏收藏 推 噓
您需要登錄後才可以回文 登錄 | 註冊

本版透可值規則

到粉絲團找朋友

|透可村民正在看
快速回覆 返回頂部 返回列表