Amazon, Amaz-off, Amaz-on-again

Amazon, Amaz-off, Amaz-on-again

Amazon, Amaz-off, Amaz-on-again

On the afternoon of Monday August 19, two strange and unsettling events occurred. First, the perpetually-available ecommerce behemoth Amazon.com vanished, taking its Canadian cousin, Amazon.ca along with it. Shoppers were greeted with a 404 Not Found/Fail Whale page and were encouraged to come back later. The outage lasted somewhere between 20 and 40 minutes.

The second strange and unsettling event happened on a freeway north of Los Angeles, where actor Dick Van Dyke narrowly cheated death after his Jaguar burst into flames. He was pulled to safety and suffered no injuries. Ironically, the car was reduced to just soot and ashes.

These two events follow on the heels of a brief and unexplained outage at Google on August 16, which was calculated to have cost Google about half-a million dollars in lost ad revenue, and resulted in an enormous 40% drop in web traffic.

Dick van Dyke's burnt out Jaguar sports car

[Photo credit: Arlene Van Dyke/Vine.com]

In all of these cases there are serious repercussions with regard to brand and reliability.

In terms of the Amazon outage, and according to an infographic produced by the ecommerce firm 500 Friends, reproduced in December 2012 in PCMag.com, Amazon’s revenue is estimated to be $9,823 every five seconds, or $117,882 per minute. Therefore an outage of forty minutes can translate into almost five million dollars in lost sales.

There are many more minutes left in every single day to more than cover the losses of such an economic brownout. It is akin to one spilled carton of milk in the neighbourhood supermarket; it’s just part of doing business.  But the fact remains that commerce on the cloud, for this biggest of the big players, as well as for all of the smaller players that surround it, still requires a careful and well-leveraged plan of action.

Rob Malnati, VP of Marketing at Cedexis agrees. “This is why organizations must remain committed to a multi-vendor strategy,” he states. His company monitors performance on the global cloud system and assists clients in ensuring real-time reliability (see this post for more detail on Cedexis.)  According to his people, the blackout was limited to Amazon and was not indicative of damage to EC2 Virginia, Amazon’s prime cloud provider.

However in an age of heightened sensitivity to cyber-attacks on prominent organizations, these momentary lapses add up in the minds of consumers and threaten to turn into a lasting impression. This is where Dick Van Dyke comes in. All of the years of marketing and brand management that Jaguar Land Rover PLC has poured into their cars over the years has the potential to disappear literally in a puff of smoke, should the public attach the Dick Van Dyke fire to their perception of Jaguar cars generally. This would be unfair, but it is how the consumer mindset works.

Such fears crawl up the corporate backbone towards the mind of the CEO, already leery of moving too quickly to the cloud, preferring in many cases to keep mission-critical applications securely in-house. Such fears are not easily put to rest. If the outages were caused by a security breach somewhere, that’s a problem that undermines the credibility of the entire cloud system.  If the outages were caused by a back-hoe cutting a cable, or a technician uploading a patch incorrectly, it calls into question the redundancy and failsafes that customers are told exist.

The lesson in all of this is that the don’t-put-your-eggs-in-one-basket approach applies equally to the cloud. Just as most of the cars that travel the freeways of L.A. don’t actually burst into flames unexpectedly, so it is that most of the cloud is safe, secure and reliable. However, as any reputable cloud provider will tell you, there are risks, which make it incumbent on all C-suite executives to ensure that they are fully involved in their company’s cloud policy, and that its rollout and maintenance is spread across a workable number of suppliers and experts.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
Fully Autonomous Cars: How’s It REALLY Going To Work?

Fully Autonomous Cars: How’s It REALLY Going To Work?

Pros and Cons and What the Experts Think Science fiction meets reality, and modern civilization is excitedly looking forward to the ubiquity of self-driving cars. However, an omnipresence of fully autonomous cars won’t happen as quickly as even some hopeful experts anticipate. While the autonomous car pros versus the cons race (See infographic discovered via…

The Lighter Side Of The Cloud – Bottlenecking

The Lighter Side Of The Cloud – Bottlenecking

By David Fletcher Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

Recent Articles - Posted by
Fintech Systems, Advancements and Investments

Fintech Systems, Advancements and Investments

Fintech Growth According to a recent report, global investment in fintech companies including both venture-backed and non-venture-backed businesses reached $9.4 billion in the second quarter of 2016; investment in venture capital-backed fintech startups, however, fell by 49%. Nevertheless, the Pulse of Fintech, published jointly by KPMG International and CB Insights, suggests venture capital investment in…

How Identity Governance Can Secure The Cloud Enterprise

How Identity Governance Can Secure The Cloud Enterprise

Securing The Cloud Enterprise Cloud adoption is accelerating for most enterprises, and cloud computing is becoming an integral part of enterprise IT and security infrastructure. Based on current adoption trends, it’s clear that the vast majority of new applications purchased by organizations will be SaaS applications. The allure is evident, from cost savings to speed…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus For Both Cloud Vendors And CIOs

Shadow IT To Remain A Focus Shadow IT, a phenomenon defined as building internal IT systems without the official organizational approval has been a growing concern for CIOs over the last few years. In 2015, it climbed to the top of the list of the emerging IT threats, with as much as 83% CIOs reporting…

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors In The Last 5 Years

Most Active Internet Of Things Investors A recent BI Intelligence report claimed that the Internet of Things (IoT) is on its way to becoming the largest device market in the world. Quite naturally, such exponential growth of the IoT market has prompted a number of high-profile corporate investors and smart money VCs to bet highly…

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do To Ensure Successful Onboarding

What Top SaaS Vendors Do I am not going to mention names in this article, but if you want to be the best, you must look at what the best do – and do it better. The importance of investing in SaaS onboarding can be easily overlooked in favor of designing efficient and powerful software…

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud: Cloud Computing Knowledge In 5 Easy Steps

Teach Yourself The Cloud Learn how to get to grips with cloud computing in business  Struggling to get your head around the Cloud? Here are five easy ways you can improve your cloud knowledge and perhaps even introduce cloud systems into your business.  Any new technology can appear daunting, and cloud computing is no exception.…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps To The Cloud Is A Business Decision

Moving Your Enterprise Apps Whether it be enterprise apps or any other, if there is any heavy data that is going to be transacted in and through an app, then affiliating it with the Cloud becomes a must. And then an important question arises: How do you decide when to integrate your enterprise app with…