ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Lego Group Is Using IT the Right Way

The Lego Group Is Using IT the Right Way

Regardless of a business’ size, technology can help it to resolve most operational challenges it is contending with. For instance, global toy producer The Lego Group shared their own story about how improved IT solutions helped it to address some significant issues it had. Let’s go over what The Lego Group did, and then see how their process could translate to your business.

What The Lego Group Was Dealing With

At this year’s AWS re:Invent conference, Lego shared that they had been experiencing some severe technical difficulties for some time. Namely, their team in charge of their Direct Shopper Technology was having some considerable problems with their online marketplace. Spikes in traffic, like those observed at product launches and sales events, could consistently reach 9.5 times their usual traffic levels, with their transactions increasing 200-fold.

One example of their difficulties came in 2017, when they launched (what was at the time) their largest set: the 7,541-piece Star Wars™ Ultimate Collector Series Millennium Falcon™. This release generated enough traffic to completely overload the backend of their website and crash the sales tax calculator that was hosted on their in-house servers.

With this turn of events, many hopeful site visitors were only presented with the website’s maintenance page.

This made it clear to The Lego Group that the limited scalability of their on-premises infrastructure wasn’t going to cut the mustard any longer, which spurred them on to make some considerable changes. These changes would not only help them to adapt to the traffic spikes they were prone to—they would also free up the customer experience team to innovate upon the website rather than fight to keep it up.

The Lego Group’s Resulting Growth

Electing to migrate to the cloud in 2018, the first tools that Lego shifted over were a few processing services and their all-important sales tax calculator. Ten months later, the company was entirely serverless, with their platform meeting the capabilities that their in-house infrastructure once provided. Soon after, their cloud capabilities had grown further and enabled them to break their previous monthly records.

By the time July of 2019 rolled around, The Lego Group had increased the number of engineers they employed by a multiple of three, thanks to remote operations. 36 more serverless platforms were added to simplify monitoring for issues and to automate some of their processes. As a result, The Lego Group has been able to focus more on features dedicated to improving the customer experience, rather than their essential upkeep.

What This Means for You

While your business may not be a 120-year-old global toy manufacturer, cloud services and the concepts around them can potentially have similar results on a scale more applicable to your own operations. The important thing to realize is that the concepts Lego put into place are scalable and industry-agnostic, so any business could conceivably benefit from putting them into place.

ClearView IT is here to help you do so. Our managed IT and consulting services are designed to help businesses adopt the modern solutions needed without adding on the worries of maintenance or other technology challenges. To find out more, give us a call today at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Cybersecurity Business Management Phishing IT Services Backup Data Backup Ransomware communications Smartphone Microsoft Office Upgrade Small Business Smartphones Mobile Devices Network Data Recovery Managed IT Services Communication Productivity Quick Tips Users Social Media VoIP Mobile Device Tech Term Automation Business Continuity Facebook Windows 10 Covid-19 Passwords Holiday Disaster Recovery Apps IT Support Managed Service Windows 10 Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Networking Artificial Intelligence Windows Workplace Strategy Managed IT services Bandwidth Business Technology Blockchain Encryption Remote App Server Virtualization Information Spam WiFi Mobile Device Management Apple Information Technology History Gmail Office Employee/Employer Relationship Two-factor Authentication Office 365 Budget Cybercrime Conferencing Health Big Data Access Control Data Security Analytics Wi-Fi BDR Cost Management IT Management Compliance Training Employer-Employee Relationship Document Management Help Desk Hacking Save Money Patch Management Remote Computing Vendor Voice over Internet Protocol Remote Monitoring Hacker Augmented Reality Word Search... IBM Data loss Best Practice Legal Website Retail Alert Data storage Hiring/Firing Outlook Applications Password Project Management Mobile Office BYOD Vulnerabilities Money Computing Customer Service Unified Threat Management Managed Services Firewall Vendor Management Hard Drive How To Marketing iPhone Cortana Twitter Google Maps Running Cable Education Scam Content Filtering Law Enforcement End of Support Storage Printer Router VPN Update The Internet of Things YouTube User Travel Virtual Reality Data Breach Social Engineering Windows 11 Cryptocurrency Paperless Office Laptop Antivirus Black Market Cleaning Maintenance Chrome Remote Workers Robot Monitoring Windows 7 Social Free Resource Sports Healthcare DDoS Websites SaaS Mobile Computing Meetings Mobility Chromebook Software as a Service Drones IT Consultant Data Protection Computers Bitcoin Disaster Solutions Automobile Customer Relationship Management Telephone Images 101 Co-Managed IT Integration How To Lithium-ion battery Display Entertainment Microchip Excel Flexibility Processors Employees Tech Terms Avoiding Downtime Hack Identity Theft Holidays Notifications Managed IT Digital Unified Communications Virtual Assistant HIPAA Cooperation Google Docs Bluetooth Taxes Video Conferencing Distributed Denial of Service Wireless Technology Virtual Machines Office Tips Memory Computer Repair Private Cloud Processor eWaste Professional Services Physical Security Downtime Safety Politics Settings Machine Learning Managed Services Provider Multi-factor Authentication Virtual Desktop PowerPoint Experience Start Menu Computer Care Administration Virtual Private Network Solid State Drive Downloads Presentation Vulnerability Saving Time Current Events Specifications Phone System FinTech Error Tablets Monitors Visible Light Communication CES IT Assessment Reading Bookmark Point of Sale Google Calendar Term Value Download Windows 8 Supercomputer Piracy Supply Chain Management Organization Cyber security Virus Shortcuts HTML Displays Nanotechnology Advertising Motion Sickness Recovery Competition Smart Devices Relocation Browsers Comparison Google Play Work/Life Balance Google Drive Upload Tech Support Software License Computer Accessories Remote Working AI Entrepreneur Trend Micro Social Network Be Proactive LiFi Corporate Profile Screen Reader Documents Digital Security Cameras Application Electronic Health Records Knowledge Data Analysis Transportation In Internet of Things Television Security Cameras Business Intelligence Wasting Time Telephony Trends Employer Employee Relationship Mobile Technology eCommerce Hacks Customer Resource management Modem Workplace Strategies Network Congestion Cabling Devices Writing Tablet G Suite Tip of the week Securty Videos Surveillance Reliable Computing Fileless Malware Mouse Managing Costs VoIP Gamification Tracking Company Culture Domains Telephone System SSID Regulations Backup and Disaster Recovery Web Server Troubleshooting Media Development Scalability Directions Employer/Employee Relationships Administrator SharePoint Virtual Machine Text Messaging Content Proactive IT Digital Payment Desktop Reviews Optimization Bring Your Own Device Electronic Medical Records Smart Technology Worker Accountants Access Database 2FA Public Speaking Teamwork Hypervisor Time Management Music Public Cloud Streaming Media Data Storage Shopping Keyboard Health IT Medical IT Equifax Spyware Tactics Hard Drive Disposal Business Owner Paperless Hard Drives Audit SQL Server PCI DSS Botnet intranet Licensing Username File Sharing Freedom of Information Wireless Gig Economy Shortcut Humor Rental Service Redundancy Supply Chain Micrsooft Startup Azure Flash Cache Addiction email scam Business Communications Heating/Cooling Internet Service Provider Navigation Environment Regulations Compliance Social Networking Managed IT Service Telephone Systems Unified Threat Management Business Growth Workers Mobile Security Windows XP News Memes User Tip Workplace Legislation Network Management CCTV Inbound Marketing Human Resources Net Neutrality Printing Evernote Financial Data Banking Touchscreen Google Wallet Computer Malfunction Fake News Risk Management IT Messenger Emergency Proxy Server Scams Deep Learning Emails Vendor Mangement Service Level Agreement Computing Infrastructure Google Apps Telework Business Metrics Management Hosted Solution Samsung Device security Electronic Payment Webcam Microsoft Excel Staffing Smartwatch Communitications Books Microsoft 365 Cables Uninterrupted Power Supply Wireless Headphones Language Business Mangement Going Green Society Business Cards IP Address Procurement Tech

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?