Our articles.

February 26th, 2020

Quantum Computing – Astronomical performances at your fingertips

Although definitely still at the prototype stage today, the quantum computer promises spectacular performance gains. This opens up new perspectives in different areas. It also allows for innovation by removing the barrier of performance and speed of execution, especially thanks to the cloud.

Bruno van Marsenille

February 17th, 2020

Trends Gazelle 2020 Vlaams Brabant

La société de consultance belge Aprico Consultants vient de se voir décerner par les magazines Trends et Trends-Tendance le titre de Gazelle 2020 pour la province de Brabant flamand dans la catégorie des moyennes entreprises. Ce titre constitue la reconnaissance de la réussite d’une entreprise belge dynamique spécialisée en transformation numérique.

Bruno van Marsenille

January 28th, 2020

From DevSecOps to SecDevOps: for even better, integrated security

Integration, integration, integration. From now on, IT and business teams need to be aligned, meaning they need to work closely together. That is the true cost of agility. If the DevSecOps concept was to design integrated security, why not choose security that is not only integrated in both operations and development, but that is at the very foundation of any initiative?

Bruno van Marsenille

December 18th, 2019

CIO: Good intentions for 2020

At the end of the year, the time is right to take a look at the balance sheet, but also to set a number of new goals. And no, there will be no rest for the Chief Information Officer in the coming year. Automation, the war for talent and business alignment remain on the agenda in 2020, without forgetting the operational side of IT.

Bruno van Marsenille

December 10th, 2019

Artificial intelligence. Go for a pragmatic approach

If there is one term in vogue in ICT these days, it has to be AI or artificial intelligence. According to Gartner, AI’s adoption rate has increased from 4% in 2018 to 14% in 2019. But still, AI covers many realities. It is therefore important to focus on technologies that offer the biggest potential or return on investment.

Bruno van Marsenille

November 19th, 2019

DevSecOps, the grail of agility

These days, a company’s success is measured by its agility, its ability to react to technological change, improve its competitiveness and conquer new markets. In the wake of the DevOps and NoOps methodologies, DevSecOps or the integration of IT security in the complete life cycle of applications seems to be a must.

Bruno van Marsenille

October 7th, 2019

ElasticSearch: transforming data into information

In modern business, data is the new oil. Consequently, a company must be capable of collecting, storing and processing large volumes of structured and unstructured data to realize a competitive advantage. An engine like ElasticSearch may help find the needle in the proverbial haystack…

Bruno van Marsenille

September 2nd, 2019

Replacing virtualisation by containers?

The IT department of an organisation must be aligned with the business needs. It can’t be developed in a traditional way anymore, knowing that the company must be proactive and flexible. Hence the emergence of Devops and agile development, or even of NoOps. This agility is not conceivable without containers...

Bruno van Marsenille

Will container technology become as widespread as application virtualisation? Although the concept of the container already exists since the beginning of this century (in particular with Linux), the success of Docker (the most popular and most used open source containerisation platform based on Linux) since 2013 has reinvigorated the use of containers.

The advantages

In fact, a container is a complete development environment integrating the application, all of its dependencies, libraries, binary files and runtime files within one single 'package'. Consequently, it is a virtual envelope integrating anything an application needs in order to function. Remark: unlike server virtualisation or virtual machines, containers don’t have an operating system, but rely on the OS of the server on which they are deployed.

Another advantage of containers is their size, since they only 'weigh' a few tens of megabytes, versus several gigabytes for virtual machines and their complete operating systems, which allows to increase portability. Moreover, virtual machines may need several minutes to start and run their applications, while containers can start almost immediately.

Moreover, containerisation is more flexible and modular since a complex application can be split into modules (database, interface…) rather than stored in one single container. This is called the ‘technique of microservices’ (please refer to a previous blog). Since these modules are lightweight, they can be managed easily and activated 'on the fly' when a need is emitted. Remark: there are many container management systems on the market, whether for Windows or Linux, but also among the main cloud providers.

Finally, a technology such as Docker allows to deploy a locally tested application in production on almost any cloud, while the operation can be complicated in the case of virtualisation.

In order to convince people of the importance of containerisation, in 2014, IBM published a performance comparison between Docker and KVM, concluding that containers equal or exceed the performance of virtualisation. In 2017, this opinion was shared by the University of Lund in Sweden, which compared containers to VMware virtualisation and came to the same conclusion. The only constraint: containers created under Linux aren’t compatible with Microsoft and vice versa, which is not the case for traditional virtualisation.

Deployment

As you can see, containerisation appears to be a solution to increase the elasticity of an application and to improve its performance since each module is optimised for its specific use. Furthermore, the development of applications is faster and their continuous deployment is simplified because in case of modification only the code of the module concerned must be adapted, not the entire application. For this same reason, operational maintenance will be easier.

Additional remark: by means of containers, the developer enjoys more autonomy and freedom of action because he can work inside the container, without having to request the creation of a virtual machine. Moreover, the developer will benefit from an application stack closer to that of the production environment, which will lead to a more fluid production launch, in principle.

Container security, sometimes considered worse than that of virtual machines (since the insulation is intrinsically linked to the VM technology), has significantly improved in recent years, especially at Docker’s, which now integrates a signature platform.

Assistance

However, we should not conclude too soon that virtualisation has had its day and that the container is the magic solution. As a matter of fact, it will be necessary to adequately assist the developer, for instance when his container will have to be deployed on a more classic production infrastructure (Software-as-a-Service platform, virtual machine…).

In practice, the IT service provider can assist the development team in a whole series of value-added services: advice on the choice of architecture and deployment methods, provisioning of the processing or storage capacity, partitioning, making monitoring tools available, settings according to specific needs…

In short, the development team will have to be closer to the infrastructure (this is exactly the challenge of the DevOps approach) as well as to its IT service provider to increase efficiency and agility, and thus be even more tuned to the business needs.

Partner

To help the internal IT department with the deployment of its IT platforms, the Aprico Enterprise Architecture entity relies on proven methodologies, as well as on tools and referential frameworks. Moreover, our specialists will strive to facilitate the dialogue between the IT department and the business entities in order to implement the solutions most adapted to the business needs. Overall, Aprico's experts rely on referential frameworks and best practices in enterprise architecture. They aim to identify and to measure the real added value of any new project in order to formulate implementable and relevant recommendations for the organisation. Moreover, Aprico's architecture specialists are part of the group's global strategy in terms of integrity, privileged contact with the customers, operational excellence and transparency. More information: marketing@aprico-consult.com

August 12th, 2019

69% of companies regard automation and process transformation as a top priority on their digital agenda

Full automation of IT operations - in other words: NoOps - is driven by the intensification of IT automation and the emergence of cloud computing. The goal is to limit - or even eliminate - the intervention of IT specialists when deploying and maintaining applications. The resources thus freed can then be allocated to new assignments.

Bruno van Marsenille

It’s a well-known figure: about 70% of an organization's total IT budget is spent on ensuring its critical applications function properly. It comes as no wonder then that, according to Deloitte's “2018 Global CIO Survey”, 69% of companies regard automation and process transformation as a top priority on their digital agenda.

Fully automated

In a NoOps environment as envisioned by Forrester, "the deployment, monitoring and management of applications and the infrastructure on which they run are fully automated," says Glenn O'Donnell, Senior Analyst and co-author of the report "Augment DevOps with NoOps". In practice, rather than having the development team test their program in an isolated environment before entrusting it (providing it meets the requirements, of course) to the operations team, the tasks assigned to that automation team are fully automated, whether they are implementation, management or even maintenance tasks. This move towards NoOps is driven by an ever-increasing automation of operations as well as by the cloud - which explains why so many Platform-as-a-Service (PaaS) providers offer this type of solution.

In DevOps, on the other hand, the development and operations teams share tasks. And they are closely involved in the whole chain (with an agile rather than a classic waterfall approach), both for code generation and functional changes as well as for the production and the life cycle of the applications.

Serverless

In reality, there are no longer any barriers between development, updates and modifications, testing, deployment, integration and maintenance, all of which are automated. In this context, the use of containers will obviously improve efficiency, agility and security, as applications integrate their complete execution environment. Indeed, these containers are built from a set of isolated microservices (see also our previous blog). And they can be dynamically created and provisioned quite simply, the challenge lying in the use of a provisioning engine smart enough to understand the needs and characteristics of the workload associated with the container. In addition, these containers reduce dependency on traditional virtualization technologies, such as VMware or Hyper-V.

It should be noted that the microservices architecture and the containers are closely linked to the serverless concept. That concept puts the cloud service provider, such as Amazon Web Services, Microsoft Azure, Google Cloud Platform or IBM Cloud, in charge of the execution of some of the code by dynamically allocating resources. Indeed, this code is usually executed in a container and sent as a function.

According to a recent survey among 600 IT decision makers, conducted by the vendor Cloud Foundry, 19% of respondents already use a serverless architecture, while 42% intend to use it in the next two years. In fact, research by MarketsandMarkets estimates that the serverless market will represent 14.93 billion USD in 2023, compared to just 4.25 billion USD in 2018.

Cloud in the centre

To succeed in a NoOps approach, or at least tend towards that goal, the cloud appears as the road to take. It allows your organization to get rid of a number of tasks related to IT operations, while an internal data centre imposes certain constraints such as the provisioning of machines, the management of the network or storage in particular. That said, on this level containers can also contribute part of the answer (see above).

In fact, the cloud will have to come in different ways. Be it, at one end of the spectrum, in the form of a Platform-as-a-Service, where the customer buys access to his applications. Or, at the other end, in the form of a Function-as-a-Service, where the customer pays only for the code he wants to run, depending on the degree of maturity of his organization.

Eventually, NoOps should allow IT to free up resources currently assigned to management tasks, the so-called IT operations. It should also give developers the option of not having to worry about 'minor' tasks related to the underlying infrastructure, the operating system, the middleware or the runtime language. Overall, it's about getting IT teams to shift from a reactive to a proactive approach.

For now, Amazon, Google and Microsoft offer serverless platforms that allow you to get closer and closer to the NoOps concept, while players such as IBM, Alibaba or Oracle offer their own approach. But it is clear that this transition will not happen overnight and requires a higher level of maturity from your IT department.

With this in mind, Aprico has been helping companies transform their business for more than two decades. Therefore, we can share best practices, technologies and organizational models that will allow you to quickly adapt to the current rapid evolutions of your business and IT environment. More information: marketing@aprico-consult.com

June 5th, 2019

Shadow IT, turning threats into opportunities

With the advent of the cloud and Software as a Service (SaaS), shadow IT is gaining ever more ground within today’s companies. Should your IT department regard this rising new trend as a threat, at the risk of losing credibility with their colleagues and maybe even some customers? Or does it offer them an opportunity to better manage their IT infrastructure and provide better IT services to end users?

van Marsenille Bruno

According to a recent study by security specialist McAfee (“Cloud Adoption and Risk Report 2019”), 21% of files hosted in the cloud contain sensitive data, while the actual sharing of such files has increased by no less than 53% in a single year. Even more striking - and worrying perhaps - is the finding from another recent study, sponsored by McAfee but conducted by Frost & Sullivan, that 80% of employees admit to already having practiced shadow IT. Either because their department has chosen and adopted a solution without consulting their IT staff, or - and just as easily - by buying software on their own initiative.

Not only is the use of shadow IT often just a mouse click and a credit card away, the millennials in your workforce also tend to consider BYOD (Bring Your Own Device) an acquired right, allowing them access to any number of professional applications from their personal devices. Consequently, many applications and devices nowadays escape the view and therefore the control or management of IT departments - which is precisely the definition of 'shadow IT'.

Threats aplenty

The dangers of shadow IT are obvious, whether in terms of security, management costs or the lack of coherence of your overall IT infrastructure. And while aspects of cost savings and greater flexibility can be put forward as clear benefits by the business or even a particular user, it is not so much the actual existence of shadow IT that seems problematic, but its huge breadth. Indeed, if shadow IT gets too widespread, it can quickly become uncontrollable, even though it’s meant to meet the needs of efficiency and agility.

In addition, the role of the IT department is precisely to translate the demands of business users into powerful IT solutions. However, the hurried choice of an external application may not fully meet the expectations and, above all, it may not be part of your company's overall IT strategy. Even worse yet, it may not even be able to integrate - sufficiently - in your company’s IT infrastructure.

Opportunities abound

Should you just surrender to shadow IT then? And give those external applications free rein within your carefully built and managed IT infrastructure? Certainly, some will evoke the ease and speed of implementation of such applications: a key argument in the context of digital transformation.

As a first step, while defining a framework for good governance, your IT department should inform your users and raise their awareness of shadow IT. In addition, it should insist on its own skills and those of its trusted partners, without necessarily closing the door on any external solutions. It should also insist on the necessary coherence of your IT environment. Not to mention important aspects of that environment, such as security and compliance - especially in view of the famous General Data Protection Regulation (GDPR).

Ultimately, your IT department should seek to position itself as a trusted partner rather than simply a service provider, by searching with its business colleagues for the most relevant solution that can be deployed in a timely manner. In other words: it needs to become a privileged and open interlocutor capable of offering informed choices in line with the priorities and objectives of each business entity. In addition, it will have to offer a catalogue of services in the form of an a la carte menu rather than a set menu.

More opportunities than threats

"The cloud offers more opportunities than threats", concludes the McAfee report. "Especially for organizations that are able to manage the risks and equip themselves with the necessary skills and tools to secure their IaaS, PaaS and Saas."

As a consulting firm specializing in information systems architecture and transformation, we at Aprico Consultants help you strengthen your position in the market by providing you with the necessary flexibility, performance and competitiveness to accelerate your digital transformation processes. As a privileged partner of your IT department, we help you identify the elements of shadow IT as part of an in-depth study of information exchanges within your company as well as with your external partners. Finally, once we understand the reason(s) for these shadow IT practices, we help you restore confidence in your business users and implement application governance policies in line with your global strategy.

Careers opportunities

We’re always looking for talented people.
Are you one of those?