An Antidote To Overprovisioning

An Antidote To Overprovisioning

 Overprovisioning

There are many situations in this world – both the virtual world of computing, and the real world, where preparedness means having more than you need. Stocking up on food, medicines, or printer paper and toner makes it easy to get things done in a timely fashion rather than having to run back out to the store.

But this preparedness comes with a price. Materials that sit on shelves waiting to be used occupy space and devour available funds. They must have great and tangible value to justify their existence, which is why so many large manufacturers rely instead on just-in-time delivery and lean techniques to ensure a smooth flow of supplies without the costly overhead.

These same efficiencies are also essential in maintaining virtual systems, but this still feels uncomfortable to administrators charged with the responsibility of keeping systems both functional and up-to-date. In the days when much of a network depended on hard physical assets such as servers and memory, it was common for admins to over-purchase as a practical alternative to the cost in labor, time and funds to buy and install upgrades on spec, or the danger involved in keeping extra parts on the shelf. It was much easier to simply buy more than needed and install it all at once.

1 Overprovisioning

Well, five points for Griffindor for proactivity perhaps, but minus several million for devouring the IT budget in one pragmatic shopping spree.

Today, upgrading, and maintaining efficiencies is much easier. Data is king, and useful information on optimum use of servers and systems is now available by the second, allowing administrators to maintain a far more dynamic and ideal system in which resources are allocated in sync with actual requirements. This means time and money saved.

Mike Raab, VP of customer service at CopperEgg , puts some numbers to this: “Let’s look at the Amazon Web Service (AWS) pricing model, for example. If you choose the US east region, you will see a 25 cent difference in the per hour charge for a small versus large instance. That is over $183 a month if it were to run full time. For Extra Large to Large it’s even worse, over $300 per month difference. Even the difference between a micro and small adds up to be over $60 per month. No small amount any way you slice it for a single instance. Now multiply that by 5, 10 or 20 instances?

For clients using the Amazon Elastic Compute Cloud (AWS EC2) platform, there is no longer any need to guess or to overprovision,” Raab says, “when the data is clearly available.” Server benchmarking, for example, allows an admin to ensure the best corresponding EC2 instance recommendation by running over a 24-hour period and measuring performance against the actual application and user load. CopperEgg’s Cloud Sizing tool is unique in the industry for allowing admins to benchmark their servers for an AWS EC2 recommendation. This results in specialized reporting that recommends instances by name, and custom-tailors EC2 instances prior to migration.

CopperEgg LogoEric Anderson, CTO and co-founder of CopperEgg summarizes this neatly: “The tools that many IT managers currently have are not built for the dynamic nature of cloud, or for the new way developers are building applications. Admins need to be ready for a new wave of application architectures that do not fit well with traditional monitoring and performance tools.” He adds, “admins are getting more pressure to see more fine grained visibility into the applications they are keeping alive, and their systems are becoming more complex, driving them to need higher frequency and more detailed tools to bring clarity when there are application level issues.”

Capitalizing on highly specific data is a technique that allows for the lean functioning of an IT department that at once saves money and optimizes performance, both internally and of course for the enhanced convenience of the end user. CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

View Website
View All Articles

Sorry, comments are closed for this post.

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

What the Dyn DDoS Attacks Taught Us About Cloud-Only EFSS

DDoS Attacks October 21st, 2016 went into the annals of Internet history for the large scale Distributed Denial of Service (DDoS) attacks that made popular Internet properties like Twitter, SoundCloud, Spotify and Box inaccessible to many users in the US. The DDoS attack happened in three waves targeting DNS service provider Dyn, resulting in a total of about…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…