Apply to MSS

First Name

Last Name

Phone

Email

State

Education

Check all that apply

Experience with a major consulting firm

Check all that apply

Certifications

Check all that apply

Experience

Check all that apply

Functional Experience

Check all that apply

Attach Cover Letter

Attach Resume

Join Our Talent Community

First Name

Last Name

Phone

Email

State

Education

Check all that apply

Experience with a major consulting firm

Check all that apply

Certifications

Check all that apply

Experience

Check all that apply

Functional Experience

Check all that apply

Attach Resume

facebook gplus linkedin sharethis
  • Blog

    blog banner
  • Category Archives: Digital Transformation

    Top 5 Cloud Trends

    Cloud technologies has been a buzz word for more than a decade ever since Amazon started selling their in-house, web-based service platform that was used to support their own internet sales site. They were able to package the technology, market it and turned it into a profitable solution that allowed companies to take advantage of large scale technologies without the upfront costs to build their own datacenters. Since then, cloud technologies have evolved quickly as a mainstay in our ever-evolving technological world.

    New, billion-dollar companies such as AirBnB and Uber have capitalized from this trend by utilizing cloud-based infrastructure to increase reliability while decreasing costs. In April of 2018, GoDaddy announced it was moving a vast majority of their current infrastructure to AWS.¹

    As companies are evolving to stay ahead in the new technology world, here are five trends that are happening with cloud computing.

    1. Growth in Cloud Services and Solutions – We are in the digital age where cloud services are now common place and businesses look to a cloud solution first before an on premises solution. 56% percent of CIOs in Gartner’s CIO survey indicate they are adopting cloud as either an option or as part of a “cloud first” approach, while 71% look to SaaS either first or as an option.

    Gartner predicts that by 2020, businesses without cloud capabilities will be as uncommon as businesses without Internet are today.

    Most businesses use some sort of cloud offering or online application such as Microsoft Office 365 or Salesforce. Few businesses are completely 100% cloud based nor are there businesses that are completely 100% cloud free.

    2. Serverless Computing – A relatively new cloud service that has come into the marketplace is serverless computing which allows developers to deploy their applications without the need to provision servers or backend infrastructure to support and run their applications. Developers can release their code and run it as a service without the need to build backend infrastructure such as servers, network, databases and backend applications to support the application. This creates simplicity and agility in the marketplace to turn out applications much more quickly than run at greater speed. This also allows companies to go global by replicating their applications to run around the world as if the local datacenter is right next door.

    3. Multi-cloud – The rise of pure play cloud platforms like Microsoft Office 365, Salesforce, ServiceNow, and Workday show that most businesses already utilize a multi-cloud cloud environment. Multicloud is the use of multiple public cloud computing and storage services in a single heterogeneous architecture not to be mistaken for hybrid cloud which is a mixture of public and private resources. Some cloud companies are changing their application architecture to force companies into a multi-cloud environment even if they are not willing to give up the hold on local resources.

    Microsoft will begin to remove Skype for Business and OneDrive for non-365 users by 2020 to force them into using Office 365

    4. Disaster Recovery – As businesses move toward a virtualized and constantly evolving IT ecosystem old DR approaches become much more expensive and complex to maintain. Software based DR at the hypervisor level allows a company to prioritize applications and provides automated testing to ensure and validate a company’s DR strategy. I can remember a year after the 9-11 disaster, the company I worked for at the time invested in a 3rd party disaster recovery site and solution. A few times a year would be spent on building out our servers and clients from backup tapes to perform drills to ensure our DR solution was adequate. This time-consuming ordeal would take 48 hours to build and test but would only ensure our most business-critical applications would be recovered. Now with the use of cloud technologies recovery can be completed and tested within minutes.

    5. Security – Last but certainly not least is security. The glaring question from anyone thinking of moving to the cloud “Is my information in the cloud secure?”. Contrary to the myth that you will lose security when you move to the public cloud because you cannot physically touch the device, in most cases you are increasing security by moving data to the cloud by utilizing the provider’s hardened datacenters with many more security resources. This all depends on your current state of security. The cloud provider is responsible for the security of the cloud (datacenters, access, security tools, etc.) while the consumer is responsible for the security in the cloud (data access policy, authentication, authorization, etc.). Security must be built into every step of product development or migration strategy rather than at the end.

    Businesses demand more as technology increases and legacy systems become less sustainable. The goal for business is to reduce risk by ensuring that crucial applications are always available. The cloud has become a tool to satisfy this business demand while reducing risk. What needs to change is the IT mindset of being a support model into being an enabler. That means rethinking IT infrastructure and services that support the business which is not always an easy task. It takes resources that understand what and how to move business applications and infrastructure to the cloud to ensure businesses do not become extinct.

    Cloud evolution is happening in the technology world, if you aren’t willing to adapt, you’ll die.


    ¹ https://www.cloudcomputing-news.net/news/2018/mar/29/godaddy-goes-all-aws-citing-containers-expertise-key/
    ² https://www.pcworld.com/article/3191298/windows/microsoft-will-cut-services-to-standalone-office-users-so-theyll-subscribe-to-office-365.html

    Embracing Business Transformation through Digital Technology Should be a ‘No-Brainer’

    Charles Zulanas, Senior Consultant of MSS Business Transformation Advisory, in this final installment of his 3-part series on decision fatigue, shows how organizations can increase efficiency and maximize profitability by embracing business transformation through digital technology.

    Technology does not eliminate the need for people to navigate their internal systems, but instead requires fewer technical and process-oriented roles which can be replaced with big-picture, strategic employees. Time-consuming and laborious processes can often be streamlined by technology and, as stated in previous articles, companies want to make processes as efficient as possible.

    3-D and augmented reality companies have created the best way to try furniture without going through the process of bringing it home then realizing it doesn’t fit the space or match the decor. This does not eliminate the need for sales people, but rather adapts their role into the bigger picture of customer-centric sales. Charles instructs regarding the best ways to gain profits and win customers through making “no-brainer” investments in technology.

    Click here to read the full article

    The Evolution of Digital Transformation and the CIO

    Ralph Stauffer, Management Consultant for MSS Business Transformation Advisory, explains the evolution of digital technology throughout the world. The Digital Age is likened to biological evolution as a result of millions of small innovative changes that take place before the next technological era occurs.

    Many innovations, discoveries, and failures were made over the last few decades culminating in the digital age. Stauffer identifies some innovations of the digital age that include blockchain, drones, Internet of Things (IoT), robots, 3D printing, virtual reality, augmented reality, and artificial intelligence. The CIO has to evolve as well, but in a way that responds rapidly to the new environment, determining the correct strategy to pursue and when to pursue it, even if uncertain of the requirements. Stauffer identifies different strategies CIOs can take to attack the digital age with success in their digital transformation efforts.

    Click here to read more

    How to Keep Your CEO Out of Prison

    The first article in a series entitled Changing the Cybersecurity Culture from Within: Leading from the Bottom-up, Dr. Romeo Farinacci, Cyber Security expert and former Program Director for IT and Cyber Security at Grand Canyon University’s College of Science, Engineering, and Technology (CSET), describes how cybersecurity needs to be adopted by CEOs as a key strategic effort within their company.

    Data is among a company’s most valuable assets. Leadership will be held responsible for data breaches that occur on their watch ($450B in 2016), because of the financial consequences these attacks have on their organization. Consider the number of resignations submitted in the last five years as result of a data breach: Target’s CIO and CEO in 2014, the head of the US government’s personnel office in 2015, and OPM’s CIO in 2016.  Dr. Farinacci talks about how your leadership can stay out of trouble with the law by implementing cybersecurity measures.

    Click here to read the full article

    Digital Transformation is Worthless Without This…

    Martin Bonadio, Business Consultant, shares his insight about how businesses think they are set up for their step into the Digital Age, but suddenly find they are behind and transformation is not as smooth as they had hoped.

    Data migration is an often discounted component of a Digital Transformation effort, and many facets are overlooked and oversimplified in the planning process. This perception can lead to scheduling the data migration near the end effort. Unfortunately, doing so can have a long reaching impact from data integrity issues, data security issues, greater resistance from users resulting in slower adoption, blown budgets, and a larger investment in the transformation strategy. Bonadio share his data migration experiences and lends insight in a step-by-step process to help ensure successful migration for your business.

    Click here to read more

    Ch, Ch, Ch, Chainges – Blockchain…the Next Sliced Bread or the Next Segway?

    Glenn Schulke, Management Consultant for MSS Business Transformation Advisory, addresses the changes in the breakthrough and transformative technology of blockchain. iTunes truly was a disruptive technology that forever changed the music industry. Blockchain itself is not like this, but rather, it is a ground-up foundational, transformative technology that paves the way for future disruptive technologies.

    An example of another foundational technology is the Internet. It started in 1969, as a tool for government and universities to share information via connected computers in a closed environment. Over time the technology evolved into its current open, shared state that is universally accessible and changed the way the world shares and consumes information, but it took nearly 30 years to become the transformative force it is. Schulke explains what blockchain is, its benefits and challenges as well as the future uses of the technology and who is starting to use it.

    Click here to read the full article

    A Cyber Security Program is not Insurance…

    Getting pulled over and found without auto insurance can cost you hundreds, but getting caught without cybersecurity can cost you millions. Dr. Romeo Farinacci, Cyber Security expert and former Program Director for IT and Cyber Security at Grand Canyon University’s College of Science, Engineering, and Technology (CSET), talks about the importance of cybersecurity programs for your company. Farinacci makes the point, “Without effective cybersecurity tools and best practices in place (i.e. appropriate patches, periodic scans, or hardened network devices) the likelihood of data loss or intellectual property leaks as result of hacks, ransomware, viruses, or simple human errors in data management increases substantially, thereby reducing an organization’s profitability, market value, trustworthiness, and ability to be competitive.” He follows up by talking about the ROI on these types of programs and the savings down the road of programs like these. This article has been referenced by VP’s that needed evidence to support cybersecurity investments for their companies and it may prove worthwhile for you, too.

    Click here to read the full article.