Wake Up! The Speed Of Business Is In Milliseconds!

Wake Up! The Speed Of Business Is In Milliseconds!

Wake up! The Speed of Business is in Milliseconds!

Back in the mid 1980’s a ground-breaking television series called Max Headroom heralded the high-speed, media-saturated age in which we now live. In addition to the acerbic title character, the show’s protagonists were journalists, working for a television network whose commercials, called “blipverts,” were merely seconds long. The executives who ran the network sat perpetually around a boardroom table, watching real-time graphics of audience viewership-by-the-second, and they fine-tuned the intensity and volume of the commercials immediately in response to those numbers.Maxheadroom

As business moves toward a full or partial embrace of the cloud, the Max Headroom “blipvert analytics factor” is becoming a reality, and one of the people who knows this best is Rob Malnati, VP of Marketing Cedexis.

His company is a specialist in performance measurement on the cloud, and it exists in part because the cloud continues to grow on a daily basis, but also because the cloud isn’t one cloud at all, but is an interconnected series of cloud providers, each with different standards, protocols and subscribers. As companies seek to serve their global or regional marketplaces, they may not realize that there’s more than just one cloud up there – there’s actually an entire weather system.

Malnati points out that for an end user, whether a client company, or an individual looking to buy a spoon collection on Amazon, the websites and supporting channels that assist in the transaction can run into trouble in a number of ways. These challenges include different browsers and operating systems, different software versions, different devices and different connection types. When it comes to satisfying people, time is truly the enemy.

Publicly available reports (available on the Cedexis website) demonstrate some fascinating facts about time and patience online. For example:

  • 81% of Internet users will abandon a page if the video fails to load immediately

  • 4.9% of sales on Yahoo can be attributed to a 400ms delay in page load time

  • Amazon can experience a 1% drop in sales when a 100 ms slowdown occurs

Bottom line, things move fast and people expect it to stay that way.

In the age old tradition of building a better mousetrap, Malnati and his team at Cedexis created Cedexis Radar to help alleviate lost opportunity from these micro-downtimes by measuring cloud performance worldwide, and helping organizations bounce between clouds in a way that best serves their traffic demands. They provide a sophisticated approach to connecting to new resources on demand. As Malnati states, “organizations have always been focused on redundancy, superfast servers, and high-speed dedicated resources. But this is going away as people migrate toward cloud, where things are much more out of control. Audiences are becoming more demanding, more global.”

The Cedexis Radar community collects performance data from all over the world – one billion measurements per day from over 34,000 network systems, actually. Malnati points out that some of the fastest growing business markets, such as Brazil, China and Indonesia do not or cannot always provide best-in-class networks. For example, trying to reach someone on a WiFi 3G connection in a developing economy can cost significantly.

Cedexis Radar tries to help orchestrate and simplify the use of new cloud-based tools by providing a single global platform for measuring performance and automating the use of them.

He says the number one issue is the need for more visibility in performance. Companies need to know if – or how well – they are delivering to their end customer. They need to understand who is else serving their customers well and who isn`t. They also need to compare objective data to assess the performance potential between Cloud A and Cloud B. Once this data is compiled, Cedexis Radar finds ways to create optimized content delivery strategies and then measure their effectiveness.

The Cedexis Radar community, now in its fourth year of operation, constantly tests platforms and systems to observe their performance, and it provides much of its computing intelligence in the form of free collaboration between the “amazons” of the world.

One technique, for example, is its Radar Tag – a line of code embedded on a web page, which assesses how the page was served. Once the page is downloaded, Cedexis can pull data from existing cloud vendors in terms of how they could have maximized their services through more access.

This means that not only does the Cedexis Radar system assess what has happened, it looks at what could have happened, through what-if simulations, to ensure that in the future its clients will be able to proactively route data through the global cloud structure, based on a wealth of both existing and theory-driven scenarios.

All this intelligence isn’t presented only on a large scale formalized platform; it is available in very simple, straightforward interface, even as as an app for Windows 8, and is very hands-on, for example, a user can drag a line across a territory map, and observe immediately where service is good and where it deteriorates. “The Cedexis Radar app is a great example of how Windows 8 puts business intelligence at the fingertips of business professionals, and adds value to the data through compelling interactivity and visualization,” said John Richards, senior director of Windows App Marketing for Microsoft Corp.

Of course Cedexis also offers a value-added paid service called OpenMix, which takes Radar data and combines it – basically performing load balancing magic to identify best routes for traffic. Malnati adds, “this lets the customer define their own app to do things like using the Radar centre to identify the best [cloud] center, but let’s handicap any overloaded center  to avoid bursting charges.”

These types of advantages lead to reduced bounce rates – where people go to a web page and then abandon it in a couple of seconds; it also means lower latency: more people are staying on a website and for longer periods.

Business today is done by the millisecond. Malnati states that today’s CIO or CTO  should be redefining themselves as the leader of a strategy focused on end-user experience, and this can only be done through the agility drawn from real-time data. As Marty Kagan Co-Founder of Cedexis adds, “the new Windows 8 app provides IT decision makers with quicker access to the performance data of both existing and potential providers, so they can make well-informed decisions, in real time.

By Steve Prentice

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

Technological Advances In The Healthcare Industry

Technological Advances In The Healthcare Industry

The Healthcare Industry The use of smart devices in healthcare is expanding, and according to a report by Technavio the global smart wearable healthcare device and services market will show a compounded annual growth rate of over 18%. Thanks to modern medicine, lifespans are increasing, resulting in aging populations and a higher frequency of chronic…

How Secure Is Your School Campus Network?

How Secure Is Your School Campus Network?

School Networks School related networks are one of the most attacked sectors today, coming in third worldwide to healthcare and retail. Because of the ever growing threat of cybercrime, IT professionals everywhere aren’t thinking in terms of “what if our network gets attacked?” Now, they think in terms of “when will our network be attacked?”…

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership to Enable Easy Hybrid Cloud Adoption

IBM and VMware Expand Partnership More than 500 new clients, including Marriott International are now running VMware software on IBM Cloud since the strategic cloud partnership was announced;Introduction of VMware Cloud Foundation on IBM Cloud helps move existing apps to the cloud within hours; More than 4,000 IBM service professionals trained to help organizations extend…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Explosive Growth Of Data-Driven Marketing

Explosive Growth Of Data-Driven Marketing

Data-Driven Marketing There is an absolute endless amount of data that is being accumulated, dissected, analyzed with the important bits extracted and used for a number of purposes. With the amount of data in the world has already reached into multiple zettabytes annually. A Zettabyte is one million petabytes or one thousand exabytes. With data…

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology: Where To Next?

M2M, IoT and Wearable Technology Profiling 600 companies and including 553 supporting tables and figures, recent reports into the M2M, IoT and Wearable Technology ecosystems forecast opportunities, challenges, strategies, and industry verticals for the sectors from 2015 to 2030. With many service providers looking for new ways to fit wearable technology with their M2M offerings…

Cloud Computing Myths That SMBs Should Know

Cloud Computing Myths That SMBs Should Know

Cloud Computing and SMBs Cloud Computing is the hottest issue among IT intellects of Small and Medium Businesses (SMBs). Like any other computer-orientated technology, Cloud Computing has some misconceptions and myths that often kick-start arguments among the two opposing groups: Cloud Supporters and Cloud Opponents. Both of these groups have their own ideology and reasons…

Cloud Computing Checklist For Startups

Cloud Computing Checklist For Startups

Checklist For Startups  There are many people who aspire to do great things in this world and see new technologies such as Cloud computing and Internet of Things as a tremendous offering to help bridge and showcase their ideas. The Time Is Now This is a perfect time for highly ambitious startups to make some…

Do Small Businesses Need Cloud Storage Service?

Do Small Businesses Need Cloud Storage Service?

Cloud Storage Services Not using cloud storage for your business yet? Cloud storage provides small businesses like yours with several advantages. Start using one now and look forward to the following benefits: Easy back-up of files According to Practicalecommerce, it provides small businesses with a way to back up their documents and files. No need…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…