Cloud Services On The East Coast Clog In The Wake of Sandy

Cloud Services On The East Coast Clog In The Wake of Sandy

In an age where the Internet infrastructure depends on the engineered redundancy of underwater cables, it is hardly possible that the effect of super storms like Sandy can go unnoticed. Hosting and colocution services went off tune after data facilities and websites on the East Coast went down in the wake of the super storm. Since the Internet is a real industry in the US, it is easy to imagine the level to which cloud providers have reached the blink trying to restore unstable networks.

Like a herald, Super Storm Sandy came with forewarnings but New Yorkers and New Jersey residents, including the captain of the lost ship Bounty of the famous Mutiny on the Bounty film, took no heed. They had not expected things to go haywire. It also brought down the cloud from the Internet skies as some service providers shut down. This came of the power outages, in the aftermath of the fire that the surging waters caused in the streets of Manhattan.

The blood stream of the global Internet is AC-2, the cables that traverse the Atlantic Ocean and bridge the data and communication divide between Europe, the Americas, Asia and Oceania. Sandy has affected them, to varying degrees, but the main blunt is on the East Coast sites.

Here is a roundup of the effects Sandy has visited upon particular cloud data facilities:

  • Telx, a provider in the Big Apple and the neighboring states said a great number of its data facilities had to rely on diesel power.
  • Internap and Peer 1, all of which have data facilities in the more sunken part of NYC were also in the eye of the storm.
  • Equinix, a data center on the big Apple, was forced to bank on its two-day strong diesel backup to operate after the blackout.
  • Navisite, on the other hand, in the sea-level side of Manhattan Island relied on its 3-day long generator backup with surplus at hand.
  • Nirvanix foreclosed the approach of Super Storm Sandy by advising its clients to churn out their data, without charge from its New Jersey headquarters, October 29.

Even when the immediate point of concern has been power failure, the cloud community is still apprehensive of the ghost of cable disruption underneath the surface of the ocean. Luckily enough, analysts are saying that redundancy, or double distribution parameters of the cables, might beat permanent Internet collapse to the chase.

While data facilities were looking up to the good old fuel guzzlers to generate power for them, websites were all night by candlelight. Some of those that doused their light for a day or two after the storm visited their premises include:

*Huffington Post, one of the most popular news blogs in the United States, crashed severally. According to the Independent UK, the site reinstated its services unsuccessfully several times throughout the unfortunate moments.

*October 31 through November 1, the flickering ghost of the Gawker site would also resurface through the Internet airwaves, severally.

*Gizmodo site went down for several hours.

If buzz from the Internet is anything to go by, certain servers for sites like Huffington Post went under a surge of water up to their waist. They lost electricity when more than 5ft of deluge visited their cellars unexpectedly.

Climatologists are arguing that the surge of the unnatural storm Sandy, so late in the season, must be due to industries, and inversely climate change. Webmasters of weather sites have noted how the ocean is 1 degree hotter than it was forty years ago. This relates directly to the fact that storms gain momentum from heat waves on the water surface. Cloud sites have been doing all they can to reduce the effects of climate change. Their methods include looking for green methods of cooling devices, such as solar. They are also using biofuel, which is not as adverse as electricity, to reduce the carbon footprint on the globe.

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…

Using Cloud Technology In The Education Industry

Using Cloud Technology In The Education Industry

Education Tech and the Cloud Arguably one of society’s most important functions, teaching can still seem antiquated at times. Many schools still function similarly to how they did five or 10 years ago, which is surprising considering the amount of technical innovation we’ve seen in the past decade. Education is an industry ripe for innovation…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…