Cloud Computing Champions Wimbledon Tennis Tournament

Cloud Computing Champions Wimbledon Tennis Tournament

The All England Lawn Tennis Club serves as host to the Wimbledon Tennis Championships, considered by many as third only to the Olympics and World Cup in terms of athletic prestige. Celebrities, dignitaries, and luminaries in myriad disciplines annually frequent the event; their presence indicates the massive respect and worldwide popularity that Wimbledon attracts. Such high regard has naturally spilled over into the World Wide Web and produces a once-yearly Internet sensation. But the watchword here is “once-yearly.”

Outside of the two weeks of Wimbledon championship action, in late June and early July, the eponymous website may receive at most half a million unique visits. Yet that figure skyrocketed to 50 million hits during the 2011 Wimbledon fortnight, a potentially frightening growth in demand on a website that insiders refer to as spikiness.

Indeed, the Wimbledon tennis competition easily qualifies as a textbook case study in how to manage a spiky uptick in demand for trustworthy storage and power in computing. Though every website covets massive traffic, too much of it can drown servers and send inexperienced IT staff heading for the hills. Yet spikiness can also generate revenue and increased visibility when properly channeled.

Enter cloud computing to save the day and protect websites from sudden surges in demand. Cloud’s scalability can equip a website with servers, bandwidth, and storage space to accommodate rapid growth or dearth in attention from visitors. This additional computing power can be purchased a la carte, allowing cloud users to attain only the extra space that they need, without wasting resources on unused storage.

To capitalize on spikiness, and to not be capsized by it, Wimbledon enlisted IBM’s SmartCloud technology. The BBC reports that the servers powering Wimbledon’s own sizable piece of the cloud in fact reside stateside, in North Carolina.

Though Wimbledon’s impressive needs for cloud space will likely consume the majority of the servers’ capacity during the two-week tournament, the All England Lawn Tennis Club can actually relinquish that power, at the tournament’s conclusion, for use by other Events with a Capital E, such as the U.S. Open.

Managing IBM SmartCloud’s use at this year’s Wimbledon are program executives Doug Clark and Alan Flack. These experts have also spearheaded a new initiative for Wimbledon’s web presence this year — a sister channel for the main site, Live @ Wimbledon, consecrated to provide online fans with direct video footage and real-time score tracking from the hottest matches of any given competition day.

As the cloud is now revealing its aptitude for the star-studded tennis championship steeped in history, we can expect a more dynamic relationship between the computing revolution and major competitive contests in the future. Olympics, anyone?

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…