News
2/25/2010
09:21 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Can Rip And Replacing Storage Solutions Be Good?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?The advantage that a storage system or software application has that is not rip and replace, is it means you can leverage what you already have in place. Most of the time that is exactly what you would prefer to do. Your current storage system or software, despite its weaknesses, is the devil you know and there is a certain amount of comfort in that. The problem is, however, what if your storage system or software has now become a collection of band-aids, extended to the point of breaking?

I'm a big fan of using what you have but sometimes in storage especially we can try to get too much mileage out of our current systems. Tape library systems and old storage arrays come to mind. In the tape library case you typically try to augment what you have with disk or if you do upgrade the tape device you do so with a similar drive type. What if a newer system that may require a rip and replace will actually save you more money than keeping your current system. Isn't it worth going through the effort?

If your new storage system or tape library can radically improve the way you manage storage or fundamentally reduce the costs, then a clean sweep might very well be in order. In the storage system use case this may be a new system that can leverage thin provisioning and even migrate old data into a thin provisioned volume. Another use case may be a system that can save on space, power and cooling costs. These capabilities and others have value, provide a rapid return on the investment and are difficult to add to existing arrays.

Most of the time you want a combination of these new capabilities to justify a rip and replace move but sometimes even a single capability can justify the move. For example I spoke with a data center manger recently that moved to a new thin provisioning system, and they were able to purchase 40% less storage capacity then what they had previously. Considering they previously had almost 50TBs of storage this represents a significant cost savings as well as power, space and cooling reductions.

Of course extending a system instead of ripping it out also has its appeal, Solid State Disk, space optimization and automated tiering are ideal examples of extending the life of an existing system. They can increase performance or capacity without the need to go to a more expensive high performance disk array or add more trays of drives. An example here is a data center manager I spoke with that added a deduplication system to his environment and reduced his capacity needs by 30%. Considering he had over 75TBs of data this will allow him to postpone his storage purchases for a year.

As always you have to weigh the pros and cons to see what makes the most sense. Can a capability be added to an existing system? Does extending its life a little further make more sense or is it time to send it packing? Our recommendation is to make sure you don't hear rip and replace and rule that potential solution out.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

CVE-2012-5487
Published: 2014-09-30
The sandbox whitelisting function (allowmodule.py) in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain privileges to bypass the Python sandbox restriction and execute arbitrary Python code via vectors related to importing.

CVE-2012-5488
Published: 2014-09-30
python_scripts.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via a crafted URL, related to createObject.

CVE-2012-5489
Published: 2014-09-30
The App.Undo.UndoSupport.get_request_var_or_attr function in Zope before 2.12.21 and 3.13.x before 2.13.11, as used in Plone before 4.2.3 and 4.3 before beta 1, allows remote authenticated users to gain access to restricted attributes via unspecified vectors.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.