The Tolly Group Report: How Dimension Data Beat Out Some Big Players

The Manuscript.png
The Report.png
Hair Loss.png
Disaster Recovery Plan.png
Twitbook.png

The Tolly Group Report: How Dimension Data beat out some big players to help keep your data up to date

(Update Revision: Initial Post, August 30th)

The next time you check out busy commercial websites – those, for example, that talk about products, sell them, ship them and generate buzz and conversation about them, spare a thought for all of the billions of bits of data running around behind the scenes to make these sites’ videos, promos and “buy now” catalogues work smoothly, reliably and securely. Much of the infrastructure behind sites like these comes to you courtesy of a few organizations that have recognized the need for a more cohesive approach to collection and redistribution of data on the cloud, through the use of a “network-centric,” rather than “best effort” structure.

The technological wizardry behind complex websites tends to go unnoticed by the average consumer; at least until something goes wrong, at which point the great “fail whale” emerges to spoil the fun.

The cloud is growing by leaps and bounds, but a great deal of the infrastructure is built on existing components. It can often be a hodgepodge of servers and programs built using elements that were not always designed to scale up to the degree and with the versatility currently required. “Cloud” may exist at the top of every CIO’s agenda, but, according to Gartner Research, it still forms a relatively small portion of the 3.7 trillion dollar IT industry.

This means we are still in the early days of the cloud as a primary technology. It has a way to go to emerge as a platform for more than just testing and development, and to become the place for hosting mission-critical data applications.

Enter the Tolly Group.

The Tolly Group was founded in 1989 to provide hands-on evaluation and certification of IT products and services. In a recent study, conducted in May 2013, Tolly researchers tested the cloud performance of some major providers: Amazon, Rackspace, IBM and Dimension Data in all four areas: CPU, RAM, storage and network performance. Their findings exposed the price and performance limitations of today’s “commodity” or “best effort” clouds that rely on traditional, server-centric architectures. The report found that of these four big players, the network-centric approach used by Dimension Data’s enterprise-class cloud helped lower cost and risk, and accelerate migration of mission-critical apps to the cloud.

Keao Caindec, CMO of the Cloud Solutions Business for Dimension Data was obviously pleased with the results of Tolly’s stringent testing, but not surprised. He points out that the report tells an interesting story. He says it shows how not all clouds are created equal, and that there is a big difference between providers. This, he believes, will force end-users to look more critically at underlying performance of any provider they choose to do business with.

As an example, Caindec points out that when someone goes and buys a router switch or server, these pieces come with specs.  But such specs don’t exist broadly in the cloud world. In many cases, he says, clouds were developed as low cost compute platforms – a best effort. Now, however, this is not enough. A provider must demonstrate a great deal more reliability in terms of speed, security and scalability – for example, designing an application to scale either up or out. When Scaling up, a provider must be able to add more power to the cloud server. When scaling out, it must be able to easily add more instances. He points out that clients in a growth phase must be careful about scaling up, since such expansions may not lead to the desired level increased performance.

Caindec points to some specific types of work that Dimension Data does with its high-profile clients: “We help them with their websites by leveraging the public cloud for testing and development. This allows granular configuration of the server, which means that each server is configured with as much storage/power as is needed.” He points out that customers often need to make sure they are not buying too much of one resource. For example a database app needs lots of memory, maybe 32 Gig of memory on a server, but not necessarily a lot of computing power. Dimension Data, he says, takes care to help clients to configure exact amount of resources necessary, allowing them to save money by not over-provisioning.

Caindec finds the Tolly study to be eye-opening primarily because it begs the question: are low cost clouds really low cost? “If the model is more best effort and because of that you have to run more servers, are you being as economical as you could?” For the most part, he points out, the costs of cloud providers are similar. But performance levels vary much more dramatically. In other words, “You may not be saving all the money you could. You may find a lower cost per hour, but in a larger environment, especially when running thousands of servers, this does not become economic.”

Caindec points out that at this point in IT history there is still a great deal that is not well understood. There are not a lot of statistics. He hopes that IT managers and CTOs everywhere will be able to obtain more granular insights from the full Tolly Report. Insights such as the fact that more memory does not mean applications will run better or provide better throughput. “If you scale up the size of the server, the server runs faster, but requires higher throughput to reach other servers.” He says companies must be careful to benchmark their own applications. It is not necessary to hire a high-profile testing firm like Tolly to do this, however; testing tools are available publicly, but he strongly advises more testing and awareness as standard practice.

By Steve Prentice

Ronald van Loon

Reimagine Contact Centers with AI and Cloud

Contact Centers with AI and Cloud Contact centers have experienced overwhelming strain since the onset of the pandemic and for many organizations this chaotic trajectory has continued. In the travel industry, for example, airlines are ...
Alex Brisbourne

Industrial IoT Cyberattacks Continue To Rise

IoT Industrial Security The Internet of Things (IoT) includes both traditional electronics and everyday ‘things’ embedded with sensors, computing, and networking capabilities. From smart coffee makers and smart homes to smart lighting and smart cities, ...
Ronald van Loon

Operationalizing AI at Scale with ModelOps

Scaling with ModelOps Putting artificial intelligence (AI) into production can be a frustrating experience for organizations, one often destined for failure. In fact, only 53% of AI projects actually move past POC and into production ...
Chris Collins

How The Cloud Put Customers First During COVID-19

Tech’s True Value in a Crisis One of the cloud’s biggest assets has always been crisis preparedness—because when disaster strikes, you don’t have to worry about the viability of on-premise servers or the availability of ...
Kash Shaikh

A Clairvoyant Look Back on 2021

In a lookback from the future, here is what happened in 2021 as reported on January 1, 2022. 2021 was the year that our world worked its way out of the 2020 pandemic and back ...

TECH ELEARNING

The CloudTweaks technology lists will include updated resources to leading services from around the globe. Examples include leading IT Monitoring Services, Bootcamps, VPNs, CDNs, Reseller Programs and much more...

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.