News

12/5/2008
08:37 AM
George Crump
George Crump
Commentary
50%
50%

Drive IN Efficiency

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.

In 2009, IT professionals will be asked yet again to do more with less. Much of this focus will be on "driving out cost" projects like primary storage reduction, archiving, and further server consolidation through virtualization. All good projects, but don't forget that you also will be asked to manage all this and your current environment with less staff, hence your need to drive IN efficiency.Drive-out cost projects are critical in the next few years and there are many ways to reduce costs and further optimize the storage and virtualization environments. These projects should be started as soon as possible, and over the next few blog entry's we will identify some key projects that can be undertaken to accomplish those goals.

Despite the best efforts and success of drive-out projects, a majority of the IT infrastructure is going to remain the same. Driving in efficiency is going to mean understanding what you have, monitoring it for change, and being able to forecast storage and virtualization utilization going forward. In fact, having this information first is an important baseline as you start those drive-out cost projects so you can measure how much cost you actually drive out.

Many of the storage or virtualization manufacturers supply some sort of monitoring tool of their environment. A few have purchased a software solution that allows for the monitoring of other vendors' products, but companies like Tek-Tools, Akorri, and MonoSphere are independent companies that provide more complete end-to-end views of the virtualization and storage environments.

These tools are critical to the success of an IT staff that is stretched too thin already and is likely to be stretched even thinner. They also are critical to the success of drive-out cost projects. Many of these projects try to cram more into the same or less space. The better-safe-than-sorry approach to storage and virtualization capacity planning is too expensive in tough economic times.

Having a real-time heads up display into your storage and virtualization infrastructures with trending capability allows you to run your storage and virtualization systems closer to the "red line," making use of that excess capacity and optimizing IT budget dollars.

Join us for our upcoming Web cast on Improving IT Efficiency.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12716
PUBLISHED: 2018-06-25
The API service on Google Home and Chromecast devices before mid-July 2018 does not prevent DNS rebinding attacks from reading the scan_results JSON data, which allows remote attackers to determine the physical location of most web browsers by leveraging the presence of one of these devices on its l...
CVE-2018-12705
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have XSS via the SSID (it is validated only on the client side).
CVE-2018-12706
PUBLISHED: 2018-06-24
DIGISOL DG-BR4000NG devices have a Buffer Overflow via a long Authorization HTTP header.
CVE-2018-12714
PUBLISHED: 2018-06-24
An issue was discovered in the Linux kernel through 4.17.2. The filter parsing in kernel/trace/trace_events_filter.c could be called with no filter, which is an N=0 case when it expected at least one line to have been read, thus making the N-1 index invalid. This allows attackers to cause a denial o...
CVE-2018-12713
PUBLISHED: 2018-06-24
GIMP through 2.10.2 makes g_get_tmp_dir calls to establish temporary filenames, which may result in a filename that already exists, as demonstrated by the gimp_write_and_read_file function in app/tests/test-xcf.c. This might be leveraged by attackers to overwrite files or read file content that was ...