News
6/25/2008
12:50 PM
George Crump
George Crump
Commentary
50%
50%

3 Ways That Storage Virtualization Can Save You Money

Storage virtualization is often billed as what I call a "Time To" product, meaning that it reduces the time it takes IT to respond to demands on the business. Virtualization shortens the amount of time that it takes to respond to a provisioning request, allowing for more rapid deployment of storage assets. IT departments also should consider storage virtualization if they need to flatten or shrink their budget.

Storage virtualization is often billed as what I call a "Time To" product, meaning that it reduces the time it takes IT to respond to demands on the business. Virtualization shortens the amount of time that it takes to respond to a provisioning request, allowing for more rapid deployment of storage assets. IT departments also should consider storage virtualization if they need to flatten or shrink their budget.How can adding a new system actually decrease your expenditures? There are many areas, but the top three are thin provisioning, wide striping, and intelligent data movement.

Thin provisioning allows you to partition a volume to the size that the application or user requests, but only consume the actual disk space that is in use at that moment in time. For example, if you have the need to deploy a 750 GB Oracle environment, we all know that on Day One it will not need anything near that amount of storage space. In fact, often the applications never grow to their projected size. Having to deploy this upfront can be costly not only because you have to actually buy the storage, but also because you have to power and cool that storage.

The few remaining thin provisioning naysayers will warn you about over-allocating and running out of actual disk space. I have never really seen that happen as today's systems provide you with so many early warnings that it makes it almost impossible to run out of disk space and not be aware that it is happening. Thin provisioning reduces the total drive count that you have to purchase to service your application, reducing capital expenditures as well as power and cooling costs.

Performance also is a cost-related issue that storage virtualization can help curtail by using wide striping. With traditional storage systems, you define your RAID groups to a finite number of drives. To get performance to a given application, you need to create a high-drive-count RAID group. This causes further capacity allocation issues, as well as increasing the likelihood of a double drive failure and potential data loss. Virtualization storage systems use wide striping to scatter data across all the available drives in a system. Typically, the virtualization engine will group the drives by type and then stripe across all of those resources. This delivers maximum performance to all applications, lowering the amount of drive spindles that need to be dedicated to one task in particular.

Intelligent data migration is a feature unique to a few storage virtualization products, delivering near perfect, tiered storage. Data movement in a tiered storage strategy always is a challenge. Intelligent data migration solves most of the issues and expands the use beyond just file data. Even databases can be tiered. This capability allows you to move data at a block level as that data ages. This means you can start your database on high performance Fibre Channel and then as parts of it age, move those parts to lower speed and lower cost disk technology. You can easily start with active data residing on 15K fibre, as blocks of data age, migrate those to 10K Fibre and then to SATA, for example. With the coming surge of SSD-based products, this type of movement could be the killer app for SSD storage.

Since this movement is transparent and seamless, with minimal performance degradation as it moves between tiers, a very aggressive migration strategy is possible, lowering the expenditure in expensive high-speed fibre drives. We will do a deeper dive on Intelligent Data Movement in a future entry.

A virtualized storage system is a very wise investment given the market right now. It is one of the few purchases that you can make in the data center that will increase productivity and user satisfaction, while at the same time significantly reduce budget expenditures as well as power and cooling costs.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.