Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud?

Where Does The Buck Stop In The Cloud?

Who is responsible for outages caused by IaaS failures. Is the relationship between traditional data centers and customers better for small and medium businesses? Consider these two scenarios.

One

You are hosting your busy website on a cluster of managed dedicated servers located in a trusted data center. You have a close working relationship with the system administrators who manage your servers. They helped you to set up your infrastructure and they understand the needs of your business, acting as first line of defense against outages and performance issues.

One morning, your cluster suffers a hard drive failure on one of its MySQL servers. It’s not a disaster because the other MySQL servers in the cluster can handle the load for the time being. But, when the peak traffic period hits in a couple of hours, performance is likely to be seriously degraded. Fortunately, the data center team spot the problem on their monitoring system and swap out the defective hardware within a couple of hours.

Most importantly, your users never have any clue that there was a problem.

cloud

Two

You are hosting your busy website on a popular IaaS provider. You were tempted to provision your infrastructure from a cloud provider by promises of cost reductions and flexibility. It was easy for your in-house team to spin up the necessary servers and networking infrastructure with the provider’s control panel. No one in your business has ever spoken to a human being that works at the cloud provider — everything is managed through a web-based interface.

One morning, you start getting emails from your users telling you that they are having trouble accessing your site. Availability is intermittent at first, but eventually the site goes down altogether. Your team takes a look at the cloud provider’s status page, which is showing performance degradations in the region that houses your site’s servers. There is nothing that can be fixed with your infrastructure, but nevertheless, your site is not accessible to your users. So, you wait, fielding user complaints to pass the time. After several hours, your site reappears online. A couple of days later your cloud provider sends out a press release blaming the outage on a misconfigured software update that propagated through their system. They offer users a rebate for the downtime and reduced price services for a short period in accordance with their service level agreement.

Who Is Responsible For Storms In The Cloud?

These examples are not entirely analogous. Outages caused by incompetence can happen in data centers housing traditionally leased servers just as easily as they can with cloud services. But, the significant issue that the differing scenarios highlight is one of responsibility and communication. One thing is certain. If your site or service goes down, your users will blame you. They don’t care about the underlying technology. Your business, however, has to know where the buck stops and who is to be relied on.

While the on-demand nature of cloud services is beneficial for some businesses and essential for a very few, the vast majority of small and mid-sized enterprises do not benefit at all from being able to spin up servers and infrastructure at will. They do however reap considerable rewards from developing a close relationship with the staff who will manage their hardware and who will be the first line of defense when something inevitably goes wrong.

By Graeme Caldwell,

Graeme works as an marketer for InterWorx, a revolutionary web hosting control panel for hosts who need scalability and reliability. Follow InterWorx on Twitter at @interworx, Like them on Facebook and check out their blog, http://www.interworx.com/community.

(Image Source: Shutterstock)

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility

Why Hybrid Cloud Delivers Better Business Agility A CIO friend of mine once told me that a hybrid cloud model enables him to “own the base, rent the spike” when it comes to unplanned events. Let’s face it – maintaining unused infrastructure for rare or random IT events is expensive and unnecessary in a cloud…

Three Factors for Choosing Your Long-term Cloud Strategy

Three Factors for Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Infographic – Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

Containerization: The Bold Face Of The Cloud In 2016

Containerization: The Bold Face Of The Cloud In 2016

Containerization And The Cloud “Right now, the biggest technology shift in the cloud is a rapid evolution from simple virtual machine (VM) hosting toward containerization’’ says the CTO of Microsoft Azure, Mark Russinovitch, a man who deals with the evolving cloud infrastructure every day. In his words, containerization is “an incredibly efficient, portable, and lightweight…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…