Keeping The Promise Of Unlimited Data Transfer

Keeping The Promise Of Unlimited Data Transfer

Keeping the Promise of Unlimited Data Transfer

Is unlimited anything actually achievable? It is quite a normal question for a customer to ask, regardless whether the product in question is data transfer on the cloud, or the all-you-can-eat buffet at the local restaurant. Can an unlimited deal really be that good?

logoCWCS1

In the case of cloud hosting it appears it can, and according to Karl Mendez, Managing Director of UK-based CWCS Managed Hosting, when customers choose wisely, they can indeed enjoy service on an unlimited scale.

That is why CWCS Managed Hosting has recently announced that it would become one of the few UK-based cloud providers to offer unlimited data transfer. Recognizing the growing need for more and more space for information flow, Mendez and his team launched a program that would provide service that would keep pace.

The three key factors in satisfactory data transfer and cloud services are strength, reliability, and cost,” says Mendez. “Strength refers to the capacity to actually send the data through the pipes to where it needs to go. You could officially call this bandwidth. But complementary to that,” he adds, “are the issues of cost – especially the hidden costs that certain providers levy when there is a spike in demand, such as when a customer’s website traffic increases. We have eliminated that. There is also reliability, in that a provider must be up and stay up to ensure that customers are able to communicate with their own customers, even when there is great demand on the system.

In describing this latter scenario, Mendez is referring to a problem called distributed downtime, in which a cloud services company’s subscribers may unwittingly or unwillingly share a temporary downgrade in throughput in order to load-balance the requirements of another customer. This, Mendez says, is very common among cloud providers, who seem to offer unlimited services, but who themselves are limited by the size of their own pipe. “You really have to read the fine print of your contract,” he says.

Mendez continues, “At CWCS we can offer unlimited bandwidth because we run, manage and operate our own data centres. We’ve set up our own cloud infrastructure and we’ve invested significant amounts in our resources. We use high specification equipment and servers and we have deliberately built in a high amount of spare capacity. In addition, unlike some other hosting companies, we never oversell (which means we never offer capacity that we don’t actually have). So basically we can offer unlimited data transfer without affecting performance”.

The demand for more ubiquitous and robust cloud services grows daily. Numerous recent developments highlight the growing need for data throughput on a large scale; an example: the adoption of high volume Wi-Fi in public spaces such as subways, airports, planes and trains that allows passengers to not merely check their email, but to watch their own movies as they travel.

Many companies will of course, jump onto the unlimited bandwagon, but Mendez warns, they are not all able to deliver as promised, or in the configurations that match a customer’s existing structure. The strategy employed by CWCS Managed Hosting is to offer unlimited data transfer through its own recommended cloud server plans, but as well as through any cloud servers that clients have configured themselves and ordered online using CWCS’s cloud server configuration tool.

Mendez points out that to protect its customers from the types of failure or abuse they might encounter elsewhere, CWCS Managed Hosting incorporates fair and acceptable usage policies so activities such as spamming, illegal file sharing, disproportionate or excessive use of resources.

Unlimited data will become as in-demand in a few short months or years, as high-speed Wi-Fi is currently, says Mendez.

He recommends that any company looking to purchase this service to better serve their customers take the time to work through the details carefully to make sure they – and their cloud provider – can deliver as promised.

By Steve Prentice

Post Sponsored By CWCS Managed Hosting

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…