Is There Enough Bandwidth Available To Support 100% Of The World Moving To Cloud Solutions?

Is There Enough Bandwidth Available To Support 100% Of The World Moving To Cloud Solutions?

Bandwidth Availability

It’s a question I’ve asked dozens of times in my blog and one I have talked to a number of different audiences and groups to and about. Is the total available deployed bandwidth enough to support the overall impact and requirements of the emerging cloud solutions?

The initial answer is no not really. The first issue is of course that the total requirements for bandwidth at any one time today are more than the system can handle. There are people who do not leverage the internet and cloud solutions full time but that number is decreasing rather than being stable or increasing. The people that “connect” connect more often and for a longer period during the work day.

I call that concept the “bandwidth shell game”  because like the famous shell game that proves the adage the hand is faster than the eye change is faster than infrastructure. At times that shell game works perfectly and at other times the bandwidth available for any one user begins to fade quickly. The problem is the number of services that are moving to cloud based scenarios is increasing not decreasing. The solutions deploying today don’t require less fidelity of connectivity, they require more fidelity of connectivity.

At the same time the connection window isn’t closing its actually growing wider. More people are connected to more solutions for more time during the day. The work day that once supported a 8 am eastern time to 6 pm eastern time window leaving a solid 14 hours a day for backup and system recovery is now gone.

invest

We could have hoped that the IPV4 “address” problem would have ended this conversation, by forcing us to slow down on the number of IP devices. Or that bandwidth providing companies would begin capping internet bandwidth per person (which they are today). The problem is that instead of the one device connecting as was the case as recently as 10 years ago, now the average user has 3 or more devices connecting. Some of the devices in question not just connecting at the same time they also connect all the time. With this change we lose the concurrency advantage. More users connected with more devices for more time, both connection total and connected total time. Add to that the overall increase in the fidelity requirements for the applications users are connecting to.

This is a great argument for building private cloud solutions within organizations in the short run. Private clouds that once built will leverage the existing LAN/WAN connectivity and don’t dump additional organizational traffic to the internet.  Like the hope that the IPv4 problem (running out of available addresses while waiting for organizations to deploy IPv6) this is a short term solution to a long term problem.

The other issue with this overall solution is that we are assuming that the traffic of today stays the same going forward. The history of the internet tells us that isn’t the case. The explosion of social media will continue to alter the patterns of connectivity. Social media doesn’t just drive connections; it drives longer more sustained connections. The average social media user connects to social solutions and stays online for longer than many other web sites. As organizations adopt the concepts of social computing that concept of higher sustained connection will continue to drive connections.

You see in the end it remains a shell game. No matter how well we watch the bandwidth or for that matter limit the number and placement of shells in the game, the hand remains faster than the eye.  The need for internet bandwidth already outstrips the available capacity of the current system. The reality is that today less than 30% of the world’s population consumes a large percentage of the currently available bandwidth. As we drive the number of devices connected, the number of total connections and increase the time of those connections can we find enough bandwidth to fill the need?

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…