Top 25 European Rising Stars 2012: Cluttr

Top 25 European Rising Stars 2012: Cluttr

Top 25 European Rising Stars 2012: Cluttr

…….The Latest Wave in Third-party Data Infrastructure Auditing for Cloud Efficiency

With one year to its name counting, Cluttr is the brainchild of two campus graduates from Ghent, Belgium. The firm focuses its energies on the data providers and the companies that seek to leverage on their data networks and equipment to make them eco-friendly. In short, this startup uses third-party software and technology to improve “energy, operational and infrastructure efficiency.” While auditing the optimal capacity of a data establishment, it helps remove extra backlogs while aiding Information Technology departments to operate seamlessly outside their hitherto retrogressive hardware-only cocoons.

Data center efficiency, for Cluttr, is two-paced. Firstly there are the little clouds by corporations and then there is the web-based one for fully-fledged data facility operators. Both concentrate on equipment. Cluttr investigates and tables results of how this equipment can stem ventilation and power consumption costs.

The company undertakes a three-tier procedure once an invitation comes in from a data provider. Firstly, it inspects the equipment to note their age, models and other statistics that might help provide a clue on consumption rate. The professionals then set up tools in place to monitor backlogs, test the efficiency levels of the technology in use, and document the energy input levels throughout a given timeline. The third step is to decode the results that their tools have obtained before going to the iterating stage: this is where an exhaustive and full audit of the results helps to expose all weaknesses and suggest feasible fixtures. It is after this that Cluttr presents its auditing suggestions to the datacenter replete with the equipment to obtain technology to use, HVAC devices, if any, to employ, and cloud systems to deploy. While that is a step-by step process, Cluttr also offers third-party solutions for managed cloud systems for corporations and professional datacenter operators. In the managed system, it closes the gap between the server owners and the software companies that rely on them in the cloud. It acts as the bridging gap too, on any research and auditing that needs to occur to know which deployment infrastructure model would suit a given company model. Does it need to deploy in the private or public clouds? It can do the necessary research for the clients eager to transform their businesses’ data infrastructure.

OpenStack is one of the major software offerings for provisioning datacenters on the cloud while offsetting the operational cost. Cluttr recommends two approaches to this cloud platform, including the Nova, as well as, Swift options. The former allows one to deploy to the cloud, in-house, using CPUs and other IT department’s basic equipment. The latter, on the other hand, helps to create efficiency on low-level servers in a way that they can be able to increase their storage scope, without passing the buck to the user.

Looking at the OpenStack system, it is easy to tell why Cluttr edifies it. The cloud platform has open source merits that can penetrate closed-in hardware elements so that the machines can be compatible with new cloud applications. Secondly, it helps to minimize the costs of operating huge data facilities, using open source stats, while still seeking to gain the same hosting capabilities as, say, Amazon S3. To be sure, this might be one of the reasons why the US National Aeronautics and Space Administration used the platform, two years ago, to implement some of its big data projects. Otherwise, the implementation could have eaten up large sums in traditional hosting environments.

On the flip side, Cluttr as a name is contradictory. It seeks to de-clutter the datacenter off backlogs that create power inefficiencies, through auditing and third-party equipment provisions, yet it carries the semantic overtone of ‘clutter.’ Still, as its partners Fredrik Van Hecke and Launrent Mainil say on the ‘About Page’ it is not about what their firm’s appellation suggests but their working goals: “simplicity and efficiency.”As a go-between between data centers and users of the web-based cloud, Cluttr deserves some accolades. The company has some connections with some machine companies including Dell and HP, which relationship, according to these professionals, helps datacenters to find the best compute equipment to suit their clients’ storage needs. When it comes to provisioning, the corporate companies may rely on companies like Cluttr to obtain managed hosting resources, in private intranets. In this regard, they work with quintessential provisioning providers like Rackspace for tech help throughout the year. The problem with this kind of arrangement is that it is subjective in nature. It might happen that one customer does not use HP products or another is not pro-Rackspace, which might cut professional ties with Cluttr.

In conclusion,

Cluttr makes it to the next wave of Top 25 Rising Stars in Europe because it has an original niche: that of third-party provisioning and direct auditing of system efficiency. It helps leverage energy consumption, eco-friendly at that, in web-based datacenters and cuts staff spending on hardware repairs in a typical company using the private cloud. It is also professionally run, going by the fact that it has co-founders with different managerial roles. It also features a professional advisor and an investor.

Previous Mention: Audriga

By John Omwamba

About John

John posses over five years experience in professional writing; with special interests in business, technology and general media. Driven by passion and 'glowing' enthusiasm, he has covered topics cutting across diverse industries with key target audiences including corporates, marketing executives, researchers and global business leaders. John currently freelances for CloudTweaks as a frequent writer.

View All Articles

Sorry, comments are closed for this post.

Comic
InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Three Ways To Secure The Enterprise Cloud

Three Ways To Secure The Enterprise Cloud

Secure The Enterprise Cloud Data is moving to the cloud. It is moving quickly and in enormous volumes. As this trend continues, more enterprise data will reside in the cloud and organizations will be faced with the challenge of entrusting even their most sensitive and critical data to a different security environment that comes with using…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Using Big Data To Analyze Venture Capitalists’ Ability To Recognize Potential

Big Data To Analyze Using Big Data to Analyze Venture Capitalists’ Ability To Recognize Potential For those who are regularly involved with SMEs, venture capital, and company valuations, it is common knowledge that start-ups that exit for more than $1 billion dollars are extremely rare – often termed ‘unicorn’ companies. Despite their rarity, it should…

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring

Internet Of Things – Industrial Robots And Virtual Monitoring One of the hottest topics in Information and Communication Technology (ICT) is the Internet of Things (IOT). According to the report of International Telecommunication Union (2012), “the Internet of things can be perceived as a vision with technological and societal implications. It is considered as a…