News
12/5/2008
08:37 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Drive IN Efficiency

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.Drive-out cost projects are critical in the next few years and there are many ways to reduce costs and further optimize the storage and virtualization environments. These projects should be started as soon as possible, and over the next few blog entry's we will identify some key projects that can be undertaken to accomplish those goals.

Despite the best efforts and success of drive-out projects, a majority of the IT infrastructure is going to remain the same. Driving in efficiency is going to mean understanding what you have, monitoring it for change, and being able to forecast storage and virtualization utilization going forward. In fact, having this information first is an important baseline as you start those drive-out cost projects so you can measure how much cost you actually drive out.

Many of the storage or virtualization manufacturers supply some sort of monitoring tool of their environment. A few have purchased a software solution that allows for the monitoring of other vendors' products, but companies like Tek-Tools, Akorri, and MonoSphere are independent companies that provide more complete end-to-end views of the virtualization and storage environments.

These tools are critical to the success of an IT staff that is stretched too thin already and is likely to be stretched even thinner. They also are critical to the success of drive-out cost projects. Many of these projects try to cram more into the same or less space. The better-safe-than-sorry approach to storage and virtualization capacity planning is too expensive in tough economic times.

Having a real-time heads up display into your storage and virtualization infrastructures with trending capability allows you to run your storage and virtualization systems closer to the "red line," making use of that excess capacity and optimizing IT budget dollars.

Join us for our upcoming Web cast on Improving IT Efficiency.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2003-1598
Published: 2014-10-01
SQL injection vulnerability in log.header.php in WordPress 0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the posts variable.

CVE-2011-4624
Published: 2014-10-01
Cross-site scripting (XSS) vulnerability in facebook.php in the GRAND FlAGallery plugin (flash-album-gallery) before 1.57 for WordPress allows remote attackers to inject arbitrary web script or HTML via the i parameter.

CVE-2012-0811
Published: 2014-10-01
Multiple SQL injection vulnerabilities in Postfix Admin (aka postfixadmin) before 2.3.5 allow remote authenticated users to execute arbitrary SQL commands via (1) the pw parameter to the pacrypt function, when mysql_encrypt is configured, or (2) unspecified vectors that are used in backup files gene...

CVE-2012-5485
Published: 2014-09-30
registerConfiglet.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote attackers to execute Python code via unspecified vectors, related to the admin interface.

CVE-2012-5486
Published: 2014-09-30
ZPublisher.HTTPRequest._scrubHeader in Zope 2 before 2.13.19, as used in Plone before 4.3 beta 1, allows remote attackers to inject arbitrary HTTP headers via a linefeed (LF) character.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Chris Hadnagy, who hosts the annual Social Engineering Capture the Flag Contest at DEF CON, will discuss the latest trends attackers are using.