<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>Estimation on Colin Barker</title>
        <link>https://colinbarker.me.uk/tags/estimation/</link>
        <description>Recent content in Estimation on Colin Barker</description>
        <generator>Hugo -- gohugo.io</generator>
        <language>en-gb</language>
        <lastBuildDate>Tue, 02 May 2023 18:11:45 +0000</lastBuildDate><atom:link href="https://colinbarker.me.uk/tags/estimation/index.xml" rel="self" type="application/rss+xml" /><item>
        <title>Boosting cloud best practice for financial services organisations</title>
        <link>https://colinbarker.me.uk/blog/2023-05-02-boosting-cloud-best-practice-for-financial-services/</link>
        <pubDate>Tue, 02 May 2023 18:11:45 +0000</pubDate>
        
        <guid>https://colinbarker.me.uk/blog/2023-05-02-boosting-cloud-best-practice-for-financial-services/</guid>
        <description>&lt;img src="https://static.colinbarker.me.uk/img/blog/2023/05/alicja-ziajowska-AOjmfr3ofSY-unsplash.jpg" alt="Featured image of post Boosting cloud best practice for financial services organisations" /&gt;&lt;blockquote&gt;
&lt;p&gt;Header photo by &lt;a class=&#34;link&#34; href=&#34;https://unsplash.com/@alicja_photos?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Alicja Ziajowska&lt;/a&gt; on &lt;a class=&#34;link&#34; href=&#34;https://unsplash.com/photos/a-building-with-columns-and-a-flag-AOjmfr3ofSY?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Unsplash&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;cloud-security-fears&#34;&gt;Cloud security fears
&lt;/h2&gt;&lt;p&gt;According to a study by cloud security specialist Barracuda, many IT security professionals are reluctant to host highly sensitive data in the cloud. This is especially true when it comes to customer information (53%) and internal financial data (55%). Respondents also said their cloud security efforts are hampered by a cybersecurity skill shortage (47%) and lack of visibility (42%). More than half (56%) are not confident that their cloud set-up is compliant.&lt;/p&gt;
&lt;p&gt;It’s likely that these concerns are felt even more acutely in financial services organisations. Yet the opportunities and benefits of cloud adoption are too great to be ignored.&lt;/p&gt;
&lt;p&gt;To help address this dichotomy, AWS published a Financial Services Industry Lens for its Well-Architected Framework. The document shows how to go beyond general best practice to satisfy stringent financial services industry demands. It focuses on “how to design, deploy, and architect financial services industry workloads that promote the resiliency, security, and operational performance in line with risk and control objectives…including those to meet the regulatory and compliance requirements of supervisory authorities.”&lt;/p&gt;
&lt;p&gt;It’s critical that financial services workloads hosted on AWS are aligned with the document’s design principles.&lt;/p&gt;
&lt;h2 id=&#34;well-architected-financial-services&#34;&gt;Well-Architected financial services
&lt;/h2&gt;&lt;p&gt;IT security risks come from within the organisation as well as outside it. Employee error or negligence can pose a significant threat, not to mention the damage that can be inflicted by malicious insiders. Whether data is stored in the cloud or on-premise, technical solutions must go hand-in-hand with operational measures.&lt;/p&gt;
&lt;p&gt;For financial services organisations, least-privileged access or a ‘zero trust’ philosophy is a good starting point. AWS also advocates four principles to underpin the design of cloud-based architectures for financial services workloads:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Documented operational planning&lt;/li&gt;
&lt;li&gt;Automated infrastructure and application deployment&lt;/li&gt;
&lt;li&gt;Security by design&lt;/li&gt;
&lt;li&gt;Automated governance&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Automating infrastructure, application deployment and governance is perhaps daunting for organisations that are new to the cloud. However, it enables security to advance to a higher level than can ever be achieved on-premise. By minimising human involvement, it significantly reduces risk of error and improves consistency. It also allows quicker execution and scaling of security, compliance and governance activities.&lt;/p&gt;
&lt;p&gt;Financial services organisations undergoing largescale migration would be well advised to refactor workloads for the new environment. This provides a valuable opportunity to introduce automation alongside security by design approaches. The additional upfront investment will go a long way towards addressing security concerns in the cloud.&lt;/p&gt;
&lt;p&gt;As well as outlining general principles for the good design of financial services workloads, AWS illustrates six common scenarios that influence design and architecture. These include financial data, regulatory reporting, AI and machine learning, grid computing, open banking and user engagement. The list is not meant to be exhaustive, but an additional scenario that we regularly encounter is that related to network connectivity.&lt;/p&gt;
&lt;p&gt;Read on to find out how we handled a financial data scenario for a customer that specialises in employee pay processes.&lt;/p&gt;
&lt;h2 id=&#34;financial-data-in-cloud-based-workloads&#34;&gt;Financial data in cloud-based workloads
&lt;/h2&gt;&lt;p&gt;According to AWS guidance, any financial data architecture should exhibit three common characteristics:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Strict requirements around user entitlements and data redistribution.&lt;/li&gt;
&lt;li&gt;Low latency requirements that change depending on how the market data is used (for example, trade decision vs. post trade analytics) and which can vary from seconds to sub-millisecond.&lt;/li&gt;
&lt;li&gt;Reliable network connectivity for market data providers and exchanges&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;But how are these upheld during mandatory audits, especially when it comes to user entitlement and data redistribution? This was the challenge facing one of our customers as it prepared for largescale cloud migration. An internal firewall appliance solution needed to meet the auditing requirements of regulatory bodies without compromising security standards.&lt;/p&gt;
&lt;p&gt;Our solution involved the CloudGuard platform from cybersecurity specialist Check Point, enabling traffic to be scanned securely in a way that met regulatory stipulations. We also suggested modernising the security set-up to make the important transition from a ‘pet’ to a ‘cattle’ mindset. This paved the way for a more automated approach firmly aligned with security by design principles as well as allowing the customer to build out scalable groups behind the scenes. Our approach is rooted in the assumption that failure is inevitable, looking to minimise the damage that occurs when it happens. In this way, it supports both the ‘reliability’ and ‘security’ pillars of Well-Architected.&lt;/p&gt;
&lt;h2 id=&#34;a-high-level-overview&#34;&gt;A high level overview
&lt;/h2&gt;


  
    
    
    
  
  
  
  
  
  
  
  &lt;figure&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://static.colinbarker.me.uk/img/blog/2023/05/networking-setup.png&#34; data-caption=&#34;Diagram of an example FSI&amp;#39;s Customer Network&#34;&gt;&lt;img src=&#34;https://static.colinbarker.me.uk/img/blog/2023/05/networking-setup.png&#34;&gt;&lt;/a&gt;
    &lt;figcaption&gt;Diagram of an example FSI&amp;#39;s Customer Network&lt;/figcaption&gt;
  &lt;/figure&gt;


&lt;p&gt;As the below diagram shows, we used AWS Gateway Load Balancers (GWLB) on the third layer of the networking Open Systems Interconnection (OSI) model, dynamically routing traffic to firewall appliances. As with any Application Load Balancer (Layer 7) or the Network Load Balancer (Layer 4), GWLB can step down to the network layer, using the GENEVE protocol, removing the need for ‘static’ or ‘pet’ instances to run the firewall appliance.
financial services networking set up&lt;/p&gt;
&lt;p&gt;GWLB understands and can control the physical path that data takes without affecting the Transport Layer (4) which primarily deals with transmission protocols. This enables the use of autoscaling to dynamically scale firewall appliances in response to changes in traffic requirements. It’s similar to how an Application Load Balancer understands and translates application traffic, forwarding it to the correct endpoint. And it’s cheaper than running the appliances all the time.&lt;/p&gt;
&lt;p&gt;As with all AWS’ Elastic Load Balancers, you can configure AWS Private Link to set up endpoint services and endpoints within subnets. We’ll come back to this later.&lt;/p&gt;
&lt;p&gt;The above design also deploys the AWS Transit Gateway (TGW) service. This ‘level up’ on the original virtual private cloud (VPC) peering option allows you to configure deeper routing of traffic between VPCs. It’s highly available, secure, and ensures traffic never needs to leave the security of your AWS network. Exposure from the public internet is reduced as there are no internet-facing endpoints. And it’s also possible to include completed routing that pushes traffic to a centralised VPC, in this case ‘Egress’. Traffic bound for the internet is routed through the TGW service, and then through the Check Point appliance. This in turn uses NAT Gateways to talk to the internet.&lt;/p&gt;
&lt;h2 id=&#34;industry-specific-requirements&#34;&gt;Industry-specific requirements
&lt;/h2&gt;&lt;p&gt;Using these services together, you can configure Internet Gateways assigned to VPCs to allow modification of routes for external traffic. It’s also possible to associate a standard VPC route table to the edge using an ‘edge association’. By pointing the routes for any external IP to the previously created TGW VPC endpoints, this traffic can be:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;encapsulated and sent through the Check Point appliances,&lt;/li&gt;
&lt;li&gt;filtered, scanned, checked, and firewalled,&lt;/li&gt;
&lt;li&gt;returned to the service that exists in the Public Subnet,&lt;/li&gt;
&lt;li&gt;sent to the final destination.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In our diagram, the Application Load Balancer in the Public Subnet balances traffic to EC2 instances in an autoscaling group.&lt;/p&gt;
&lt;p&gt;The final service is the AWS Resource Access Manager (RAM), which is part of AWS Organizations. Centralised network administration is a key compliance requirement for several financial services certifications or programmes. However, configuring a VPC for access from the internet requires an Internet Gateway, which poses a security risk. Deploying the VPC and Internet Gateway into a central network account provides full control and visibility for relevant people. However, building resources in this VPC would normally require additional work to give appropriate levels of access. AWS RAM solves this by sharing resources with other accounts.&lt;/p&gt;
&lt;p&gt;In the above example, two of the four subnets required for the set-up to work have been shared. So, the account with the shared subnets will be able to build resources and have full control of the process. However, it will not be able to bypass routing options set in place by the networking team, specifically the Gateway Load Balancer endpoint. This reduces risk and assures security/networking teams and auditors that nobody working in the accounts can bypass Check Point appliances.&lt;/p&gt;
&lt;h2 id=&#34;enhanced-security-outcomes&#34;&gt;Enhanced security outcomes
&lt;/h2&gt;&lt;p&gt;The above solution ensures all traffic, specifically confidential information, is internally routed and doesn’t leave the secure network. Any traffic ingress and egress passes through the Check Point appliances, securing the data within the AWS network.&lt;/p&gt;
&lt;p&gt;Network engineers, security teams and compliance auditors are given a centralised view and greater visibility of the deployed AWS network. The set-up permits any specific custom data monitoring elements using the Check Point appliances. With additional custom routing on TGW, you can also force traffic between VPCs to pass through the Check Point appliances. This adds a further level of network segregation, which can reduce the risk of data exfiltration between accounts and environments.&lt;/p&gt;
&lt;p&gt;An additional benefit is that the Check Point appliance service works like any on-premises version. This reduces the need to re-skill teams to use a different technology stack and facilitates integration with existing management services. It also means the same solution can work with other networking appliances that support the GENEVE protocol, extending the range of services that align with the organisation’s existing skillsets.&lt;/p&gt;
&lt;h2 id=&#34;putting-the-solution-to-the-test&#34;&gt;Putting the solution to the test
&lt;/h2&gt;&lt;p&gt;The solution design itself was deployed to a financial services customer that had specific requirements around both ISO27001 compliance, and their own internal security teams. As with all customers you work with, there will always be requirements which do not fit a &amp;ldquo;standard&amp;rdquo; pattern of deployment, or services required. While there are many AWS services that could be used that are managed by AWS through the shared responsibility model, there are times when these might not meet a specific set of requirements. For our customer at Expert Thinking, we had to ensure that pre-existing administration of the Check Point appliances hosted in-house was not separated from the management of network security within AWS. Using the AWS Gateway Load Balancer to our advantage, we were able to use the Check Point Cloud Guard appliances instead.&lt;/p&gt;
&lt;p&gt;By using this solution, we were still able to meet the checks within the AWS Well-Architected Framework for &lt;a class=&#34;link&#34; href=&#34;https://docs.aws.amazon.com/wellarchitected/latest/framework/sec-05.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;section 5 of the Security Pillar&lt;/a&gt;. Specifically the sections on &lt;a class=&#34;link&#34; href=&#34;https://docs.aws.amazon.com/wellarchitected/latest/framework/sec_network_protection_layered.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Controlling traffic at all layers&lt;/a&gt; and &lt;a class=&#34;link&#34; href=&#34;https://docs.aws.amazon.com/wellarchitected/latest/framework/sec_network_protection_auto_protect.html&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Automating network protection&lt;/a&gt;. This was achieved through the use of the centralised Check Point Management system across the customer&amp;rsquo;s networking estate, and it feeing in key information to the Check Point Appliances within AWS, so that the pre-existing automations for network security were achieved, including across all of the layers.&lt;/p&gt;
&lt;p&gt;One of the great ideals behind the Well-Architected Framework, is that it is not a check-list to use specific AWS services, but a checklist of concepts that if you follow, will ensure you are Well-Architected. Automating network protection could be using AWS WAF, or AWS CloudFront, as well as also using a managed firewall, or a firewall that you have installed on an EC2 instance that you run automation scripts on. Look at the risk behind each option, and if you have removed the risk, or accepted the risk with mitigations in place, then you will continue to be Well-Architected.&lt;/p&gt;
&lt;h2 id=&#34;expert-thinkings-well-architected-assessment&#34;&gt;Expert Thinking&amp;rsquo;s Well-Architected Assessment
&lt;/h2&gt;&lt;p&gt;We at Expert Thinking used our own &lt;a class=&#34;link&#34; href=&#34;https://expert-thinking.co.uk/aws-well-architected-reviews/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;AWS Well-Architected Assessment&lt;/a&gt; throughout the process of delivering for this customer. The review is not just a single check that you leave to the side, but a continual check throughout the whole delivery process. Expert Thinking ran the AWS Well-Architected Review at the discovery phase of our journey, understanding the current security requirements and potential high risk elements that we would need to remediate. Working with the customer during the design and implementation phases, we continually checked in with the Well-Architected Framework to ensure that the work we had been delivering still met with the standards set within each of the pillars.&lt;/p&gt;



  
    
    
    
  
  
  
  
  
  
  
  &lt;figure&gt;
    &lt;a data-fancybox=&#34;gallery&#34; href=&#34;https://static.colinbarker.me.uk/img/blog/2023/05/AWS-Well-Architected-diagram.png&#34; data-caption=&#34;The Six Pillars of the AWS Well-Architected Framework&#34;&gt;&lt;img src=&#34;https://static.colinbarker.me.uk/img/blog/2023/05/AWS-Well-Architected-diagram.png&#34;&gt;&lt;/a&gt;
    &lt;figcaption&gt;The Six Pillars of the AWS Well-Architected Framework&lt;/figcaption&gt;
  &lt;/figure&gt;


&lt;p&gt;Once we had completed the delivery for the customer, a final review was performed by Expert Thinking&amp;rsquo;s consultants to once again show that we had delivered the security requirements set by both the customer and the Well-Architected Framework. In doing so, we continued to boost the best practices for our financial services customer.&lt;/p&gt;
&lt;p&gt;If you wish to discuss with Expert Thinking running an AWS Well-Architected Assessment on your estate, then &lt;a class=&#34;link&#34; href=&#34;https://expert-thinking.co.uk/contact/&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;please reach out to our wonderful team&lt;/a&gt; who will be able to set you along the path of continued best practices.&lt;/p&gt;
</description>
        </item>
        <item>
        <title>Five common mistakes that skew cloud migration TCO estimates</title>
        <link>https://colinbarker.me.uk/blog/2023-04-19-common-mistakes-that-skew-cloud-migration-tco-estimates/</link>
        <pubDate>Wed, 19 Apr 2023 12:50:19 +0000</pubDate>
        
        <guid>https://colinbarker.me.uk/blog/2023-04-19-common-mistakes-that-skew-cloud-migration-tco-estimates/</guid>
        <description>&lt;img src="https://static.colinbarker.me.uk/img/blog/2023/04/christopher-bill-rrTRZdCu7No-unsplash.jpg" alt="Featured image of post Five common mistakes that skew cloud migration TCO estimates" /&gt;&lt;blockquote&gt;
&lt;p&gt;Header photo by &lt;a class=&#34;link&#34; href=&#34;https://unsplash.com/@umbra_media?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Christopher Bill&lt;/a&gt; on &lt;a class=&#34;link&#34; href=&#34;https://unsplash.com/photos/5-pieces-of-banknotes-on-yellow-and-white-textile-rrTRZdCu7No?utm_content=creditCopyText&amp;amp;utm_medium=referral&amp;amp;utm_source=unsplash&#34;  target=&#34;_blank&#34; rel=&#34;noopener&#34;
    &gt;Unsplash&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2 id=&#34;what-can-be-done&#34;&gt;What can be done?
&lt;/h2&gt;&lt;p&gt;Either scenario can result in decision makers and business managers getting the wrong impression of cloud computing, and potentially missing out on major business benefits. To avoid falling into this trap, a more considered approach to TCO calculation is needed. A detailed look at likely repercussions of migration can reveal both positive and negative outcomes, which enables more informed decisions.&lt;/p&gt;
&lt;p&gt;As the AWS Practice Lead at Expert Thinking, I support and guide clients at every step of their cloud migration journey. Over the years, I’ve found that five key factors are often overlooked during an organisation’s TCO calculation phase. When they’re acknowledged, the result is a far more sophisticated estimation that goes beyond immediate transactional costs to build a longer-term picture.&lt;/p&gt;
&lt;h2 id=&#34;the-five-factors-that-hinder-tco-calculations&#34;&gt;The five factors that hinder TCO calculations
&lt;/h2&gt;&lt;h3 id=&#34;like-for-like-comparisons-are-rarely-accurate&#34;&gt;Like-for-like comparisons are rarely accurate
&lt;/h3&gt;&lt;p&gt;At a basic level, cloud migration TCO estimates look at the cost of hosting an instance in the original environment versus hosting the same instance in the cloud. AWS provides a great tool for this initial comparison with its Migration Evaluator.&lt;/p&gt;
&lt;p&gt;However, things are never quite as simple as a like-for-like comparison might suggest. It should be treated as the first step, giving an initial indication of TCO ahead of further analysis and consideration of the wider context.&lt;/p&gt;
&lt;p&gt;For instance, when migrating from a datacentre to the cloud, the depreciation of equipment value should be factored in. If the hardware CAPEX was expected to span five years, and cloud migration happens after two, that cost will remain on the balance sheet for another three years. What’s more, the cloud costs will include an allocation for management overhead and network bandwidth in addition to hosting.&lt;/p&gt;
&lt;p&gt;On the face of it, these factors could make costs following cloud migration seem disproportionately high. But the story doesn’t end there.&lt;/p&gt;
&lt;h3 id=&#34;shared-responsibility-is-often-misunderstood&#34;&gt;Shared responsibility is often misunderstood
&lt;/h3&gt;&lt;p&gt;A central aspect of AWS’ cloud offering is the shared responsibility model. It means AWS handles the operation, management and control of components from the operating system and virtualisation layer as well as the physical security of facilities.&lt;/p&gt;
&lt;p&gt;So, while at first glance it may look as though monthly costs are higher with AWS, this doesn’t account for the reduced operational burden that shared responsibility brings. Relieving people from the ongoing management of underlying hardware unlocks new potential for staff productivity and business agility. Both of these elements play a critical role in deriving value from cloud computing, as per the AWS Cloud Value Framework.&lt;/p&gt;
&lt;p&gt;For instance, time previously spent on day-to-day security and compliance matters can be diverted to application development or operational enhancements. This is a golden opportunity to reskill or upskill staff, boosting team morale. It ultimately leads to cumulative benefits as people make improvements and pass new learnings on to colleagues.&lt;/p&gt;
&lt;h3 id=&#34;the-impact-of-past-incidents-and-outages-is-forgotten&#34;&gt;The impact of past incidents and outages is forgotten
&lt;/h3&gt;&lt;p&gt;Like-for-like comparisons also ignore the fact that historic performance and reliability issues can be mitigated in the new environment through improved operational resilience.&lt;/p&gt;
&lt;p&gt;Based on conversations we’ve had with hundreds of medium and large firms, it’s not uncommon for costs associated with a single outage to exceed £100k. When teams are too busy to properly identify or resolve underlying issues, they simply patch the platform up and the problems continue. It’s important to factor costs associated with platform instability into the TCO equation since many issues can be alleviated in the cloud environment.&lt;/p&gt;
&lt;p&gt;The benefits of cloud-based business continuity can be harnessed from the outset of the migration process. For instance, AWS’ CloudEndure Disaster Recovery is an excellent tool that can be implemented across physical, virtual and cloud servers alike. We regularly use it on a short-term basis to protect customers’ existing environments during transformative migrations. It means that while time and energy is focused on building the new environment, the risk of suffering an outage on the old one is greatly reduced. CloudEndure can also be used as a cloud migration tool in situations where an automated lift-and-shift is appropriate.&lt;/p&gt;
&lt;h3 id=&#34;software-licences-get-overlooked&#34;&gt;Software licences get overlooked
&lt;/h3&gt;&lt;p&gt;As with hardware, software licences need to be included in TCO estimates as not all software solutions are cloud friendly. Older licenses may be held on physical CPUs or per cores, and others are simply not portable to the cloud. AWS offers ‘Bring Your Own Licences’ (BYOL) options for Windows Server Licences via EC2 instances. However, there may be additional licences that cannot be used in the new environment, potentially resulting in cost duplication.&lt;/p&gt;
&lt;p&gt;Taking steps to understand the impact of cloud migration on software licence costs at an early stage is critical. Conducting an AWS Migration Readiness Assessment is an effective way to achieve this. The assessment identifies systems that are reliant on software and triggers questions related to licence Ts&amp;amp;Cs. From here, decision makers can make an informed judgement surrounding total costs of hardware, software and licences in the original environment compared to an AWS PAYG model.&lt;/p&gt;
&lt;h3 id=&#34;existing-contractual-obligations-go-unnoticed&#34;&gt;Existing contractual obligations go unnoticed
&lt;/h3&gt;&lt;p&gt;Multiyear contracts for services such as rack rental are another factor that’s often forgotten in like-for-like comparison. Decommissioning racks before the end of a contract can result in penalty charges that should be included in the TCO calculation. It’s useful to prepare a burndown chart of costs for existing contracted services to provide clarity on the matter.&lt;/p&gt;
&lt;p&gt;For organisations that prefer to work with a long-term contract fee structure, AWS can offer multi-year deals that may offset some of the costs associated with early termination penalties. Options include Amazon EC2 Reserved Instances and Savings Plans, both of which are up to 72% cheaper than on-demand instance pricing.
Take a broad perspective&lt;/p&gt;
&lt;h2 id=&#34;in-summary&#34;&gt;In Summary
&lt;/h2&gt;&lt;p&gt;TCO calculations need to look beyond the initial transaction. They should consider the bigger picture of costs involved with migrating to the cloud versus remaining in the current environment. Even then, the true value of cloud computing extends beyond potential cost savings. It unlocks new ways of working that boost staff productivity, operational resilience and business agility. The combined benefits of these improvements can have a transformative impact on business culture and performance. Cloud migration is an opportunity to reposition any business as dynamic, customer-focused and value-driven, rather than a slow-moving, cost-led entity.&lt;/p&gt;
</description>
        </item>
        
    </channel>
</rss>
