News
12/5/2008
08:37 AM
George Crump
George Crump
Commentary
50%
50%

Drive IN Efficiency

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.Drive-out cost projects are critical in the next few years and there are many ways to reduce costs and further optimize the storage and virtualization environments. These projects should be started as soon as possible, and over the next few blog entry's we will identify some key projects that can be undertaken to accomplish those goals.

Despite the best efforts and success of drive-out projects, a majority of the IT infrastructure is going to remain the same. Driving in efficiency is going to mean understanding what you have, monitoring it for change, and being able to forecast storage and virtualization utilization going forward. In fact, having this information first is an important baseline as you start those drive-out cost projects so you can measure how much cost you actually drive out.

Many of the storage or virtualization manufacturers supply some sort of monitoring tool of their environment. A few have purchased a software solution that allows for the monitoring of other vendors' products, but companies like Tek-Tools, Akorri, and MonoSphere are independent companies that provide more complete end-to-end views of the virtualization and storage environments.

These tools are critical to the success of an IT staff that is stretched too thin already and is likely to be stretched even thinner. They also are critical to the success of drive-out cost projects. Many of these projects try to cram more into the same or less space. The better-safe-than-sorry approach to storage and virtualization capacity planning is too expensive in tough economic times.

Having a real-time heads up display into your storage and virtualization infrastructures with trending capability allows you to run your storage and virtualization systems closer to the "red line," making use of that excess capacity and optimizing IT budget dollars.

Join us for our upcoming Web cast on Improving IT Efficiency.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0714
Published: 2015-05-02
Multiple cross-site scripting (XSS) vulnerabilities in Cisco Finesse Server 10.0(1), 10.5(1), 10.6(1), and 11.0(1) allow remote attackers to inject arbitrary web script or HTML via unspecified parameters, aka Bug ID CSCut53595.

CVE-2014-3598
Published: 2015-05-01
The Jpeg2KImagePlugin plugin in Pillow before 2.5.3 allows remote attackers to cause a denial of service via a crafted image.

CVE-2014-8361
Published: 2015-05-01
The miniigd SOAP service in Realtek SDK allows remote attackers to execute arbitrary code via a crafted NewInternalClient request.

CVE-2015-0237
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 ignores the permission to deny snapshot creation during live storage migration between domains, which allows remote authenticated users to cause a denial of service (prevent host start) by creating a long snapshot chain.

CVE-2015-0257
Published: 2015-05-01
Red Hat Enterprise Virtualization (RHEV) Manager before 3.5.1 uses weak permissions on the directories shared by the ovirt-engine-dwhd service and a plugin during service startup, which allows local users to obtain sensitive information by reading files in the directory.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.