Oracle
INSIGHTS

Transition to Cloud Services: Workload Categories – IT Infrastructure

The organizations are rapidly looking for ways to move to cloud services. While deciding workload placement, the highest priority should be to understand your organization’s business needs and pain points. These are the different kind of workloads of IT infrastructure that need to be considered.

File/Print Sharing

  • This category includes the software that enable users on a network to share files and printers across different computers and cache servers as well.
  • Captured within respective individual workloads (ERP, CRM) are embedded portions of file and print.

Networking

  • Include networking applications that support foundational networking process.
  • Networking processes can be directory, security/authentication, network data/file transfer, communication, and system data/file transfer.
  • Captured within respective individual workloads (ERP, CRM) are embedded networking functions.

Proxy

  • Applications that improve data centre performance by storing and serving content from the network edge.
  • Includes data caching workloads.
  • Captured within respective individual workloads (ERP, CRM) are embedded portions of proxy caching.

Security

  • Applications designed for authentication and identification and typically performing “firewall” services, as well as Unified Threat Management and Deep Packet Inspection workloads.
  • Captured within respective individual workloads (ERP, CRM) are embedded portions of security.
  • Includes workloads that fit the technical computing definition.
  • Excludes R&D workloads included in the national/ industrial security workload.

Systems Management/ Monitoring

  • These are discrete tasks responsible for monitoring and accounting for systems performance, resource planning, and resource allocation.
  • Includes infrastructure virtualization and monitor and control workloads.
  • Also included are encrypt/decrypt , backup and recovery, compress/decompress, thin provisioning, etc, which are recognized as discrete storage management tasks.

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to top
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.