News
2/25/2010
09:21 AM
George Crump
George Crump
Commentary
50%
50%

Can Rip And Replacing Storage Solutions Be Good?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?

When you hear the term "Rip and Replace" it is not typically considered a good feature. In fact most of the time you hear it will be from a vendor stating that their solution is NOT rip and replace. Which of course they expect you to take to be good. Are there times though were rip and replace could be a good thing?The advantage that a storage system or software application has that is not rip and replace, is it means you can leverage what you already have in place. Most of the time that is exactly what you would prefer to do. Your current storage system or software, despite its weaknesses, is the devil you know and there is a certain amount of comfort in that. The problem is, however, what if your storage system or software has now become a collection of band-aids, extended to the point of breaking?

I'm a big fan of using what you have but sometimes in storage especially we can try to get too much mileage out of our current systems. Tape library systems and old storage arrays come to mind. In the tape library case you typically try to augment what you have with disk or if you do upgrade the tape device you do so with a similar drive type. What if a newer system that may require a rip and replace will actually save you more money than keeping your current system. Isn't it worth going through the effort?

If your new storage system or tape library can radically improve the way you manage storage or fundamentally reduce the costs, then a clean sweep might very well be in order. In the storage system use case this may be a new system that can leverage thin provisioning and even migrate old data into a thin provisioned volume. Another use case may be a system that can save on space, power and cooling costs. These capabilities and others have value, provide a rapid return on the investment and are difficult to add to existing arrays.

Most of the time you want a combination of these new capabilities to justify a rip and replace move but sometimes even a single capability can justify the move. For example I spoke with a data center manger recently that moved to a new thin provisioning system, and they were able to purchase 40% less storage capacity then what they had previously. Considering they previously had almost 50TBs of storage this represents a significant cost savings as well as power, space and cooling reductions.

Of course extending a system instead of ripping it out also has its appeal, Solid State Disk, space optimization and automated tiering are ideal examples of extending the life of an existing system. They can increase performance or capacity without the need to go to a more expensive high performance disk array or add more trays of drives. An example here is a data center manager I spoke with that added a deduplication system to his environment and reduced his capacity needs by 30%. Considering he had over 75TBs of data this will allow him to postpone his storage purchases for a year.

As always you have to weigh the pros and cons to see what makes the most sense. Can a capability be added to an existing system? Does extending its life a little further make more sense or is it time to send it packing? Our recommendation is to make sure you don't hear rip and replace and rule that potential solution out.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7830
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in mod/feedback/mapcourse.php in the Feedback module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 allows remote authenticated users to inject arbitrary web script or HTML by leveraging the mod/feedback:mapcourse cap...

CVE-2014-7831
Published: 2014-11-24
lib/classes/grades_external.php in Moodle 2.7.x before 2.7.3 does not consider the moodle/grade:viewhidden capability before displaying hidden grades, which allows remote authenticated users to obtain sensitive information by leveraging the student role to access the get_grades web service.

CVE-2014-7832
Published: 2014-11-24
mod/lti/launch.php in the LTI module in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 performs access control at the course level rather than at the activity level, which allows remote authenticated users to bypass the mod/lti:view capability requirement by vi...

CVE-2014-7833
Published: 2014-11-24
mod/data/edit.php in Moodle through 2.4.11, 2.5.x before 2.5.9, 2.6.x before 2.6.6, and 2.7.x before 2.7.3 sets a certain group ID to zero upon a database-entry change, which allows remote authenticated users to obtain sensitive information by accessing the database after an edit by a teacher.

CVE-2014-7834
Published: 2014-11-24
mod/forum/externallib.php in Moodle 2.6.x before 2.6.6 and 2.7.x before 2.7.3 does not verify group permissions, which allows remote authenticated users to access a forum via the forum_get_discussions web service.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?