An Antidote To Overprovisioning

An Antidote To Overprovisioning

 Overprovisioning

There are many situations in this world – both the virtual world of computing, and the real world, where preparedness means having more than you need. Stocking up on food, medicines, or printer paper and toner makes it easy to get things done in a timely fashion rather than having to run back out to the store.

But this preparedness comes with a price. Materials that sit on shelves waiting to be used occupy space and devour available funds. They must have great and tangible value to justify their existence, which is why so many large manufacturers rely instead on just-in-time delivery and lean techniques to ensure a smooth flow of supplies without the costly overhead.

These same efficiencies are also essential in maintaining virtual systems, but this still feels uncomfortable to administrators charged with the responsibility of keeping systems both functional and up-to-date. In the days when much of a network depended on hard physical assets such as servers and memory, it was common for admins to over-purchase as a practical alternative to the cost in labor, time and funds to buy and install upgrades on spec, or the danger involved in keeping extra parts on the shelf. It was much easier to simply buy more than needed and install it all at once.

1 Overprovisioning

Well, five points for Griffindor for proactivity perhaps, but minus several million for devouring the IT budget in one pragmatic shopping spree.

Today, upgrading, and maintaining efficiencies is much easier. Data is king, and useful information on optimum use of servers and systems is now available by the second, allowing administrators to maintain a far more dynamic and ideal system in which resources are allocated in sync with actual requirements. This means time and money saved.

Mike Raab, VP of customer service at CopperEgg , puts some numbers to this: “Let’s look at the Amazon Web Service (AWS) pricing model, for example. If you choose the US east region, you will see a 25 cent difference in the per hour charge for a small versus large instance. That is over $183 a month if it were to run full time. For Extra Large to Large it’s even worse, over $300 per month difference. Even the difference between a micro and small adds up to be over $60 per month. No small amount any way you slice it for a single instance. Now multiply that by 5, 10 or 20 instances?

For clients using the Amazon Elastic Compute Cloud (AWS EC2) platform, there is no longer any need to guess or to overprovision,” Raab says, “when the data is clearly available.” Server benchmarking, for example, allows an admin to ensure the best corresponding EC2 instance recommendation by running over a 24-hour period and measuring performance against the actual application and user load. CopperEgg’s Cloud Sizing tool is unique in the industry for allowing admins to benchmark their servers for an AWS EC2 recommendation. This results in specialized reporting that recommends instances by name, and custom-tailors EC2 instances prior to migration.

CopperEgg LogoEric Anderson, CTO and co-founder of CopperEgg summarizes this neatly: “The tools that many IT managers currently have are not built for the dynamic nature of cloud, or for the new way developers are building applications. Admins need to be ready for a new wave of application architectures that do not fit well with traditional monitoring and performance tools.” He adds, “admins are getting more pressure to see more fine grained visibility into the applications they are keeping alive, and their systems are becoming more complex, driving them to need higher frequency and more detailed tools to bring clarity when there are application level issues.”

Capitalizing on highly specific data is a technique that allows for the lean functioning of an IT department that at once saves money and optimizes performance, both internally and of course for the enhanced convenience of the end user. CopperEgg offers a free trial of their monitoring and optimization solutions here.

By Steve Prentice

Post Sponsored By Copperegg

About Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

Find out more
View All Articles

Sorry, comments are closed for this post.

Comic
Cloud Computing – The Good and the Bad

Cloud Computing – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be a big part of our future in both business and personal spheres. The current and future possibilities of global access to files and data, remote working opportunities, improved storage structures, and greater solution distribution have…

The FTC, Data Privacy and Facebook

The FTC, Data Privacy and Facebook

Data Protection Facebook is in deep water over their recent decision to start harvesting phone numbers from one of the apps they own, called WhatsApp. WhatsApp is a mobile phone app that allows people to place long distance phone calls and send SMS messages for free. A complaint was filed with the Federal Trade Commission…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Rounding Out Your Security Strategy With The Enterprise Cloud

Rounding Out Your Security Strategy With The Enterprise Cloud

Enterprise Cloud Security Strategy No company wants to be the one to have to announce one of the world’s biggest data breaches. From managing networks and datacenters to protecting hundreds of applications, today’s enterprises face enormous challenges. With all the surface area that needs to be tracked and protected including APIs on the front-end, customer integrations…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most

The Industries That The Cloud Will Change The Most Cloud computing is rapidly revolutionizing the way we do business. Instead of being a blurry buzzword, it has become a facet of everyday life. Most people may not quite understand how the cloud works, but electricity is quite difficult to fathom as well. Anyway, regardless of…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

The Internet of Things Lifts Off To The Cloud

The Internet of Things Lifts Off To The Cloud

The Staggering Size And Potential Of The Internet of Things Here’s a quick statistic that will blow your mind and give you a glimpse into the future. When you break that down, it translates to 127 new devices online every second. In only a decade from now, every single vehicle on earth will be connected…