Case Study: Comic Relief Goes Cloud Computing with the Help of Riverbed Technology

Comic Relief Goes Cloud Computing with the Help of Riverbed Technology

Every two years, one of the biggest events in the UK fundraising calendar is Comic Relief’s Red Nose Day. The charity raises tens of millions of pounds in donations through its website, which is its primary fundraising and donation portal. It is therefore crucial to have full functionality during peak periods, and to ensure there is absolutely no downtime.

In 2009, the charity’s IT team looked to improve on its 2007 performance, but in doing so faced a critical business decision of how to upgrade its IT infrastructure. The challenge was to create a virtual web infrastructure that handled the different types of traffic, which continuously peaks and bursts during the seven hour TV show, and to maintain 100 percent uptime while reducing the amount of hardware running all year round.

The charity realized that its needs were moving beyond the limitations of the hardware they had, and were keen to take advantage of the latest and best technology to increase its capability and efficiency,” explains Charlotte Melén, Comic Relief’s Web Technology Manager.

 Cloud was the logical choice

Carrenza helped develop Comic Relief’s web and donations platforms using technology donated by the likes of Riverbed®, Cisco, HP, Oracle, and VMware.

Our aim was to reduce the 15 racks of hardware that were on all year round, but that outside the big campaign were hardly used. So it was logical to move to virtualized machines, which enabled us to run six server racks containing 60 to 80 virtual machines.  They supported the web payment front end, which was also used by 12,000 call center operators to take donations,” Melén says.

Read Full Case Study

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

What Technology Can Displace The Password?

What Technology Can Displace The Password?

The Future Password Many people shout that the password is dead or should be killed dead. The password could be killed, however, only when there is an alternative to the password. Let us think about what technology can displace the password. Some people might say that multi-factor authentications or ID federations will do it. It is not…

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground

Cloud as Our Children’s Playground We read everyday about the fast pace of business adoption of the cloud.  But children are adopting the cloud at just as an aggressive pace.  The Cloud is changing our children’s lives – the way they play, learn, and interact with others and the world around them.  I see children…

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Throughout The World

IoT Rapid Expansion Cyber Physical Systems (CPS) are a nomenclature used to define the world beyond IoT devices. CPS includes the robotic and automation systems that interact with the IoT devices. Based on that changing landscape I have come to realize that CPS and by default IoT devices actually have three distinct concerns. The three…

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most From IoT/CSP?

What Agency Can Benefit The Most? I was recently giving a talk to some students when one of them asked me a question I hadn’t heard before. She said “How does the Internet of Things really impact the government? What agency benefits the most from IoT/CPS?” I paused for a moment, it is a great…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing: On The Fringe or Mainstream?

Cloud Computing Revenue Numbers Imagine that your viewpoint is shared by 5% of people. You’d be in a fringe political party, perhaps, or share a fondness for some obscure sport or hobby. Or you’d be a proponent of Cloud Computing. Because the reality is that after many years of technical development, entrepreneurial freneticism, and big-company marketing,…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Sponsor