Cloud
2/10/2009
11:37 AM
George Crump
George Crump
Commentary
50%
50%

Cloud Storage's Killer App... Geographic Collaboration

Cloud storage can be used for backups, archives, and extra disk space, but the ability to collaborate on documents, even if it is in a sequential process, could be the most significant.

Cloud storage can be used for backups, archives, and extra disk space, but the ability to collaborate on documents, even if it is in a sequential process, could be the most significant.I don't want to minimize cloud storage's use as an archive storage area, but the archive storage market has well-established players in it. Where cloud storage vendors like Bycast, EMC, and Cleversafe have an advantage with a cloud storage specific infrastructure is with their ability to geographically disperse data, as discussed in an earlier entry.

This geographic dispersion of data then leads to the next obvious use case for cloud storage...geographic collaboration. In today's corporate world, knowledge workers no longer sit across from each other in cubes or can huddle up for a quick review in a conference room, they are spread out across the country and the world.

Up until now the primary way to handle collaborative work on documents was to send out an e-mail to the team, wait for edits or changes to a document, and then try to merge all those changes together. Some were organized enough to send to one person, let them edit, and have that person forward to the next in line. These methods are time consuming, lead to multiple copies of a slightly similar document, and obviously jam e-mail systems.

Geographic collaboration, on the other hand, stores one identity of a document but disperses multiple copies of that document. When a user opens that document it is done so from the closest geographic location. When the user is done editing the document, the other copies of that document can be updated throughout the cloud. As a result, when the next person has time to make edits, that person has the latest copy and it is also served from their closest storage location.

This collaboration works in both private and public cloud storage models. In a private setting, the geographic nodes can be physically available at each remote site but managed centrally via the cloud storage console. In fact, the private-use case may be better because the user always has the feel of local performance. With public cloud, the geographic nodes would help with performance but the advantage of the geographic location may not be as noticeable.

The technology and the hardware is there, but until the software matures you need to be careful. A consumer example is Dropbox. This service allows you to keep certain folders in sync with other users and as soon as a change is made the file is synced back to the main service. It works amazingly well.

In the corporate world, the software that will run on top of these cloud storage infrastructures needs to mature. Capabilities like check in / check out and commenting need to be added to the offering to make sure that two people don't edit the same document at the same time. There is no need to wait for that software -- the infrastructures as they exist today are far better than e-mailing the same document around the organization 15 different times.

View our Web cast on cloud storage infrastructures to learn more.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.