News
12/5/2008
08:37 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Drive IN Efficiency

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.Drive-out cost projects are critical in the next few years and there are many ways to reduce costs and further optimize the storage and virtualization environments. These projects should be started as soon as possible, and over the next few blog entry's we will identify some key projects that can be undertaken to accomplish those goals.

Despite the best efforts and success of drive-out projects, a majority of the IT infrastructure is going to remain the same. Driving in efficiency is going to mean understanding what you have, monitoring it for change, and being able to forecast storage and virtualization utilization going forward. In fact, having this information first is an important baseline as you start those drive-out cost projects so you can measure how much cost you actually drive out.

Many of the storage or virtualization manufacturers supply some sort of monitoring tool of their environment. A few have purchased a software solution that allows for the monitoring of other vendors' products, but companies like Tek-Tools, Akorri, and MonoSphere are independent companies that provide more complete end-to-end views of the virtualization and storage environments.

These tools are critical to the success of an IT staff that is stretched too thin already and is likely to be stretched even thinner. They also are critical to the success of drive-out cost projects. Many of these projects try to cram more into the same or less space. The better-safe-than-sorry approach to storage and virtualization capacity planning is too expensive in tough economic times.

Having a real-time heads up display into your storage and virtualization infrastructures with trending capability allows you to run your storage and virtualization systems closer to the "red line," making use of that excess capacity and optimizing IT budget dollars.

Join us for our upcoming Web cast on Improving IT Efficiency.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
DevOps’ Impact on Application Security
DevOps’ Impact on Application Security
Managing the interdependency between software and infrastructure is a thorny challenge. Often, it’s a “developers are from Mars, systems engineers are from Venus” situation.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-4840
Published: 2014-07-28
Unspecified vulnerability in HP and H3C VPN Firewall Module products SECPATH1000FE before 5.20.R3177 and SECBLADEFW before 5.20.R3177 allows remote attackers to cause a denial of service via unknown vectors.

CVE-2014-2974
Published: 2014-07-28
Cross-site request forgery (CSRF) vulnerability in php/user_account.php in Silver Peak VX through 6.2.4 allows remote attackers to hijack the authentication of administrators for requests that create administrative accounts.

CVE-2014-2975
Published: 2014-07-28
Cross-site scripting (XSS) vulnerability in php/user_account.php in Silver Peak VX before 6.2.4 allows remote attackers to inject arbitrary web script or HTML via the user_id parameter.

CVE-2014-3303
Published: 2014-07-28
The web framework in Cisco WebEx Meetings Server does not properly restrict the content of query strings, which allows remote attackers to obtain sensitive information by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, aka Bug ID CSCuj81713.

CVE-2014-3304
Published: 2014-07-28
The OutlookAction Class in Cisco WebEx Meetings Server allows remote attackers to enumerate user accounts by entering crafted URLs and examining the returned messages, aka Bug ID CSCuj81722.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.