News
2/25/2010
09:21 AM
George Crump
George Crump
Commentary
50%
50%

Can Rip And Replacing Storage Solutions Be Good?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?The advantage that a storage system or software application has that is not rip and replace, is it means you can leverage what you already have in place. Most of the time that is exactly what you would prefer to do. Your current storage system or software, despite its weaknesses, is the devil you know and there is a certain amount of comfort in that. The problem is, however, what if your storage system or software has now become a collection of band-aids, extended to the point of breaking?

I'm a big fan of using what you have but sometimes in storage especially we can try to get too much mileage out of our current systems. Tape library systems and old storage arrays come to mind. In the tape library case you typically try to augment what you have with disk or if you do upgrade the tape device you do so with a similar drive type. What if a newer system that may require a rip and replace will actually save you more money than keeping your current system. Isn't it worth going through the effort?

If your new storage system or tape library can radically improve the way you manage storage or fundamentally reduce the costs, then a clean sweep might very well be in order. In the storage system use case this may be a new system that can leverage thin provisioning and even migrate old data into a thin provisioned volume. Another use case may be a system that can save on space, power and cooling costs. These capabilities and others have value, provide a rapid return on the investment and are difficult to add to existing arrays.

Most of the time you want a combination of these new capabilities to justify a rip and replace move but sometimes even a single capability can justify the move. For example I spoke with a data center manger recently that moved to a new thin provisioning system, and they were able to purchase 40% less storage capacity then what they had previously. Considering they previously had almost 50TBs of storage this represents a significant cost savings as well as power, space and cooling reductions.

Of course extending a system instead of ripping it out also has its appeal, Solid State Disk, space optimization and automated tiering are ideal examples of extending the life of an existing system. They can increase performance or capacity without the need to go to a more expensive high performance disk array or add more trays of drives. An example here is a data center manager I spoke with that added a deduplication system to his environment and reduced his capacity needs by 30%. Considering he had over 75TBs of data this will allow him to postpone his storage purchases for a year.

As always you have to weigh the pros and cons to see what makes the most sense. Can a capability be added to an existing system? Does extending its life a little further make more sense or is it time to send it packing? Our recommendation is to make sure you don't hear rip and replace and rule that potential solution out.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7896
Published: 2015-03-03
Multiple cross-site scripting (XSS) vulnerabilities in HP XP P9000 Command View Advanced Edition Software Online Help, as used in HP Device Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Tiered Storage Manager 6.x through 8.x before 8.1.2-00, HP XP P9000 Replication Manager 6.x and 7.x before ...

CVE-2014-9283
Published: 2015-03-03
The BestWebSoft Captcha plugin before 4.0.7 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2014-9683
Published: 2015-03-03
Off-by-one error in the ecryptfs_decode_from_filename function in fs/ecryptfs/crypto.c in the eCryptfs subsystem in the Linux kernel before 3.18.2 allows local users to cause a denial of service (buffer overflow and system crash) or possibly gain privileges via a crafted filename.

CVE-2015-0890
Published: 2015-03-03
The BestWebSoft Google Captcha (aka reCAPTCHA) plugin before 1.13 for WordPress allows remote attackers to bypass the CAPTCHA protection mechanism and obtain administrative access via unspecified vectors.

CVE-2015-2168
Published: 2015-03-03
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue in customer-controlled software. Notes: none.

Dark Reading Radio
Archived Dark Reading Radio
How can security professionals better engage with their peers, both in person and online? In this Dark Reading Radio show, we will talk to leaders at some of the security industry’s professional organizations about how security pros can get more involved – with their colleagues in the same industry, with their peers in other industries, and with the IT security community as a whole.