Article

ICT becomes as easy as baking cookies

2 min read
December 21, 2023
ICT becomes as easy as baking cookies

When you look to the future, perhaps the most important change comes from a different angle than you might think. In the delusion of everyday life, we only see the trendy terms: digitization, artificial intelligence, blockchain, et cetera. But there is another change going on that makes ICT as easy as baking cookies. What? Cloud technology that takes all the complexity away from you. No more worries about the platform, infrastructure and software, but convenience. In the process, you choose the recipe and your favorite ingredients, and you no longer have to worry about the brand and/or installation description of the oven.

Those who delve into “Cloud Foundry” probably recognize themselves in this metaphor: with Cloud Foundry, you can bake carefree. From now on, you can simply bake the cookies according to the recipe you like best. The way you want it. While underlying you use a cloud-provided ‘oven’ (e.g. AWS, Google, Azure or private cloud in your own data center) and cloud-provided ingredients (easy-to-use services like a databases, file storage, single sign on service or SaaS services like Office 365 or Salesforce and ERP SaaS). All of this connected through Cloud Foundry.

Your developers (the bakers) only have to deal with what they are good at: selecting the right ingredients (the best services and the appropriate development language) and producing (baking) good code.

What are the advantages of this way of working:

  • You can develop faster – you can try out new recipes quickly, the ingredients and ovens are easily interchangeable and can be found in the cloud (your unlimited pantry).
  • You can phase out legacy – step by step you can phase out the complexity of legacy and transition to a more flexible platform.
  • Feasible for small and large organizations – you can focus on what you are good at (your recipe). You leave the other knowledge (about the ingredients and the oven) to others if you don’t know or don’t want to know about it.

What are the (possible) disadvantages? You are going to work differently. The knowledge to manage platforms, infrastructure and generic software is needed less and less. In contrast, the knowledge to know the right components and suppliers becomes more important again. So the ICT organization requires different qualifications and competencies. Technology is not the limitation. Perhaps the biggest challenge is: can you turn existing ICT people into good bakers.

Frank van Vonderen
Frank van Vonderen

Partner

Frank is partner at Highberg and achieved an MSCs in business at the University of Rotterdam, a Masters degree in Information Security. He holds several…
Discover more

Related insights

IT projects in the public sector: Lessons from practice
Article
10 months ago | 19 min read
IT projects in the public sector: Lessons from practice

Government IT projects often fail not because of technology, but due to structural flaws in planning, organization, and execution. Issues such as deliberate deception, excessive optimism, and rigid governance lead to delays and cost overruns. The solution lies in Adaptive Flow: a flexible, iterative approach that sets realistic goals, monitors progress, and addresses organizational bottlenecks. Without attention to the organization, digital innovation remains ineffective.

IT Projects Break all the Rules: How complexity demands different Risk- and Project Management
Article
10 months ago | 1 min read
IT Projects Break all the Rules: How complexity demands different Risk- and Project Management

In my 30 years working in consulting, helping large organizations to navigate the challenges of large-scale software development, I’ve learned a hard truth: Managing IT projects with traditional project management and risk frameworks does not work. No matter how much rigor you apply, no matter how many “good practices” you adopt, IT projects stubbornly defy predictability.

A Safe IT Environment
Article
1 year ago | 4 min read
A Safe IT Environment

How do I know I’m safe enough? Anyone concerned with making their IT environment secure will at some point ask themselves, am I on the right track? Am I doing enough about information security? Is my most important information (crown jewels) secure? What is good enough? Implementing a security framework (such as the BIO or ISO27001 and NEN7510, for example), combined with a risk assessment, is often the most commonly followed path. Implementing a framework does not directly answer the questions above. The use of a structured approach will help. Also, in the future, with new threats, this approach can easily be gone through again to efficiently determine where additional measures are needed so that one always knows they are safe enough.