Is There Enough Bandwidth Available To Support 100% Of The World Moving To Cloud Solutions?

Is There Enough Bandwidth Available To Support 100% Of The World Moving To Cloud Solutions?

Bandwidth Availability

It’s a question I’ve asked dozens of times in my blog and one I have talked to a number of different audiences and groups to and about. Is the total available deployed bandwidth enough to support the overall impact and requirements of the emerging cloud solutions?

The initial answer is no not really. The first issue is of course that the total requirements for bandwidth at any one time today are more than the system can handle. There are people who do not leverage the internet and cloud solutions full time but that number is decreasing rather than being stable or increasing. The people that “connect” connect more often and for a longer period during the work day.

I call that concept the “bandwidth shell game”  because like the famous shell game that proves the adage the hand is faster than the eye change is faster than infrastructure. At times that shell game works perfectly and at other times the bandwidth available for any one user begins to fade quickly. The problem is the number of services that are moving to cloud based scenarios is increasing not decreasing. The solutions deploying today don’t require less fidelity of connectivity, they require more fidelity of connectivity.

At the same time the connection window isn’t closing its actually growing wider. More people are connected to more solutions for more time during the day. The work day that once supported a 8 am eastern time to 6 pm eastern time window leaving a solid 14 hours a day for backup and system recovery is now gone.

invest

We could have hoped that the IPV4 “address” problem would have ended this conversation, by forcing us to slow down on the number of IP devices. Or that bandwidth providing companies would begin capping internet bandwidth per person (which they are today). The problem is that instead of the one device connecting as was the case as recently as 10 years ago, now the average user has 3 or more devices connecting. Some of the devices in question not just connecting at the same time they also connect all the time. With this change we lose the concurrency advantage. More users connected with more devices for more time, both connection total and connected total time. Add to that the overall increase in the fidelity requirements for the applications users are connecting to.

This is a great argument for building private cloud solutions within organizations in the short run. Private clouds that once built will leverage the existing LAN/WAN connectivity and don’t dump additional organizational traffic to the internet.  Like the hope that the IPv4 problem (running out of available addresses while waiting for organizations to deploy IPv6) this is a short term solution to a long term problem.

The other issue with this overall solution is that we are assuming that the traffic of today stays the same going forward. The history of the internet tells us that isn’t the case. The explosion of social media will continue to alter the patterns of connectivity. Social media doesn’t just drive connections; it drives longer more sustained connections. The average social media user connects to social solutions and stays online for longer than many other web sites. As organizations adopt the concepts of social computing that concept of higher sustained connection will continue to drive connections.

You see in the end it remains a shell game. No matter how well we watch the bandwidth or for that matter limit the number and placement of shells in the game, the hand remains faster than the eye.  The need for internet bandwidth already outstrips the available capacity of the current system. The reality is that today less than 30% of the world’s population consumes a large percentage of the currently available bandwidth. As we drive the number of devices connected, the number of total connections and increase the time of those connections can we find enough bandwidth to fill the need?

By Scott Andersen

About Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence Supports Better Business Performance

Cloud-based GRC Intelligence All businesses need a strategy and processes for governance, risk and compliance (GRC). Many still view GRC activity as a burdensome ‘must-do,’ approaching it reactively and managing it with non-specialized tools. GRC is a necessary business endeavor but it can be elevated from a cost drain to a value-add activity. By integrating…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Driving Success: 6 Key Metrics For Every Recurring Revenue Business

Recurring Revenue Business Metrics Recurring revenue is the secret sauce behind the explosive growth of powerhouses like Netflix and Uber. Unsurprisingly, recurring revenue is also quickly gaining ground in more traditional industries like healthcare and the automotive business. In fact, nearly half of U.S. businesses have adopted or are planning to adopt a recurring revenue model,…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…

Why Small Businesses Need A Business Intelligence Dashboard

Why Small Businesses Need A Business Intelligence Dashboard

The Business Intelligence Dashboard As a small business owner you would certainly know the importance of collecting and analyzing data pertaining to your business and transactions. Business Intelligence dashboards allow not only experts but you also to access information generated by analysis of data through a convenient display. Anyone in the company can have access…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…