An Antidote To Overprovisioning

An Antidote To Overprovisioning

 Overprovisioning

There are many situations in this world – both the virtual world of computing, and the real world, where preparedness means having more than you need. Stocking up on food, medicines, or printer paper and toner makes it easy to get things done in a timely fashion rather than having to run back out to the store.

But this preparedness comes with a price. Materials that sit on shelves waiting to be used occupy space and devour available funds. They must have great and tangible value to justify their existence, which is why so many large manufacturers rely instead on just-in-time delivery and lean techniques to ensure a smooth flow of supplies without the costly overhead.

These same efficiencies are also essential in maintaining virtual systems, but this still feels uncomfortable to administrators charged with the responsibility of keeping systems both functional and up-to-date. In the days when much of a network depended on hard physical assets such as servers and memory, it was common for admins to over-purchase as a practical alternative to the cost in labor, time and funds to buy and install upgrades on spec, or the danger involved in keeping extra parts on the shelf. It was much easier to simply buy more than needed and install it all at once.

1 Overprovisioning

Well, five points for Griffindor for proactivity perhaps, but minus several million for devouring the IT budget in one pragmatic shopping spree.

Today, upgrading, and maintaining efficiencies is much easier. Data is king, and useful information on optimum use of servers and systems is now available by the second, allowing administrators to maintain a far more dynamic and ideal system in which resources are allocated in sync with actual requirements. This means time and money saved.

Mike Raab, VP of customer service at CopperEgg , puts some numbers to this: “Let’s look at the Amazon Web Service (AWS) pricing model, for example. If you choose the US east region, you will see a 25 cent difference in the per hour charge for a small versus large instance. That is over $183 a month if it were to run full time. For Extra Large to Large it’s even worse, over $300 per month difference. Even the difference between a micro and small adds up to be over $60 per month. No small amount any way you slice it for a single instance. Now multiply that by 5, 10 or 20 instances?

For clients using the Amazon Elastic Compute Cloud (AWS EC2) platform, there is no longer any need to guess or to overprovision,” Raab says, “when the data is clearly available.” Server benchmarking, for example, allows an admin to ensure the best corresponding EC2 instance recommendation by running over a 24-hour period and measuring performance against the actual application and user load. CopperEgg’s Cloud Sizing tool is unique in the industry for allowing admins to benchmark their servers for an AWS EC2 recommendation. This results in specialized reporting that recommends instances by name, and custom-tailors EC2 instances prior to migration.

CopperEgg LogoEric Anderson, CTO and co-founder of CopperEgg summarizes this neatly: “The tools that many IT managers currently have are not built for the dynamic nature of cloud, or for the new way developers are building applications. Admins need to be ready for a new wave of application architectures that do not fit well with traditional monitoring and performance tools.” He adds, “admins are getting more pressure to see more fine grained visibility into the applications they are keeping alive, and their systems are becoming more complex, driving them to need higher frequency and more detailed tools to bring clarity when there are application level issues.”

Capitalizing on highly specific data is a technique that allows for the lean functioning of an IT department that at once saves money and optimizes performance, both internally and of course for the enhanced convenience of the end user. CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Is Machine Learning Making Your Data Scientists Obsolete?

Is Machine Learning Making Your Data Scientists Obsolete?

Machine Learning and Data Scientists In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies. Although the field of computer and information research scientists is growing faster than any other occupation, the increasing applicability of data science across business sectors is leading to an exponential…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…