Cloud Computing Champions Wimbledon Tennis Tournament

Cloud Computing Champions Wimbledon Tennis Tournament

The All England Lawn Tennis Club serves as host to the Wimbledon Tennis Championships, considered by many as third only to the Olympics and World Cup in terms of athletic prestige. Celebrities, dignitaries, and luminaries in myriad disciplines annually frequent the event; their presence indicates the massive respect and worldwide popularity that Wimbledon attracts. Such high regard has naturally spilled over into the World Wide Web and produces a once-yearly Internet sensation. But the watchword here is “once-yearly.”

Outside of the two weeks of Wimbledon championship action, in late June and early July, the eponymous website may receive at most half a million unique visits. Yet that figure skyrocketed to 50 million hits during the 2011 Wimbledon fortnight, a potentially frightening growth in demand on a website that insiders refer to as spikiness.

Indeed, the Wimbledon tennis competition easily qualifies as a textbook case study in how to manage a spiky uptick in demand for trustworthy storage and power in computing. Though every website covets massive traffic, too much of it can drown servers and send inexperienced IT staff heading for the hills. Yet spikiness can also generate revenue and increased visibility when properly channeled.

Enter cloud computing to save the day and protect websites from sudden surges in demand. Cloud’s scalability can equip a website with servers, bandwidth, and storage space to accommodate rapid growth or dearth in attention from visitors. This additional computing power can be purchased a la carte, allowing cloud users to attain only the extra space that they need, without wasting resources on unused storage.

To capitalize on spikiness, and to not be capsized by it, Wimbledon enlisted IBM’s SmartCloud technology. The BBC reports that the servers powering Wimbledon’s own sizable piece of the cloud in fact reside stateside, in North Carolina.

Though Wimbledon’s impressive needs for cloud space will likely consume the majority of the servers’ capacity during the two-week tournament, the All England Lawn Tennis Club can actually relinquish that power, at the tournament’s conclusion, for use by other Events with a Capital E, such as the U.S. Open.

Managing IBM SmartCloud’s use at this year’s Wimbledon are program executives Doug Clark and Alan Flack. These experts have also spearheaded a new initiative for Wimbledon’s web presence this year — a sister channel for the main site, Live @ Wimbledon, consecrated to provide online fans with direct video footage and real-time score tracking from the hottest matches of any given competition day.

As the cloud is now revealing its aptitude for the star-studded tennis championship steeped in history, we can expect a more dynamic relationship between the computing revolution and major competitive contests in the future. Olympics, anyone?

By Jeff Norman

About Jeff Norman

Jeff Norman is a freelance writer currently based in New York City. He's moved into writing about cloud computing from substantial work in culture and the arts. He earned his undergraduate degree in English at Stanford and has studied at Oxford and Cambridge.

View All Articles

Sorry, comments are closed for this post.

Comics
Two 2017 Trends From A Galaxy Far, Far Away

Two 2017 Trends From A Galaxy Far, Far Away

Reaching For The Stars People who know me know that I’m a huge Star Wars fan. I recently had the opportunity to see Rogue One: A Star Wars Story. While I won’t give any spoilers away for the few who haven’t seen the movie yet, I do want to mention a couple of trends from…

2017 Brings DLP Technology and IoT’s Weaknesses to Light

2017 Brings DLP Technology and IoT’s Weaknesses to Light

DLP Technology In regards to data loss prevention (DLP), in the last five years many companies rushed to implement DLP solutions without taking the time to first identify the data that should not transit egress points. Most of these rushed implementations have not been successful. Security analysts, in particular 451 Research, have been recommending that…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…