Cloud
2/10/2009
11:37 AM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage's Killer App... Geographic Collaboration

Cloud storage can be used for backups, archives, and extra disk space, but the ability to collaborate on documents, even if it is in a sequential process, could be the most significant.

Cloud storage can be used for backups, archives, and extra disk space, but the ability to collaborate on documents, even if it is in a sequential process, could be the most significant.I don't want to minimize cloud storage's use as an archive storage area, but the archive storage market has well-established players in it. Where cloud storage vendors like Bycast, EMC, and Cleversafe have an advantage with a cloud storage specific infrastructure is with their ability to geographically disperse data, as discussed in an earlier entry.

This geographic dispersion of data then leads to the next obvious use case for cloud storage...geographic collaboration. In today's corporate world, knowledge workers no longer sit across from each other in cubes or can huddle up for a quick review in a conference room, they are spread out across the country and the world.

Up until now the primary way to handle collaborative work on documents was to send out an e-mail to the team, wait for edits or changes to a document, and then try to merge all those changes together. Some were organized enough to send to one person, let them edit, and have that person forward to the next in line. These methods are time consuming, lead to multiple copies of a slightly similar document, and obviously jam e-mail systems.

Geographic collaboration, on the other hand, stores one identity of a document but disperses multiple copies of that document. When a user opens that document it is done so from the closest geographic location. When the user is done editing the document, the other copies of that document can be updated throughout the cloud. As a result, when the next person has time to make edits, that person has the latest copy and it is also served from their closest storage location.

This collaboration works in both private and public cloud storage models. In a private setting, the geographic nodes can be physically available at each remote site but managed centrally via the cloud storage console. In fact, the private-use case may be better because the user always has the feel of local performance. With public cloud, the geographic nodes would help with performance but the advantage of the geographic location may not be as noticeable.

The technology and the hardware is there, but until the software matures you need to be careful. A consumer example is Dropbox. This service allows you to keep certain folders in sync with other users and as soon as a change is made the file is synced back to the main service. It works amazingly well.

In the corporate world, the software that will run on top of these cloud storage infrastructures needs to mature. Capabilities like check in / check out and commenting need to be added to the offering to make sure that two people don't edit the same document at the same time. There is no need to wait for that software -- the infrastructures as they exist today are far better than e-mailing the same document around the organization 15 different times.

View our Web cast on cloud storage infrastructures to learn more.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.