10:30 AM
George Crump
George Crump

Selecting Your Next Storage Project - Edge Projects

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?Project selection has to be representative of what users need or are asking for, but this has to be balanced with the needs of the overall data center and frankly the IT staff itself. I find that users are often calling for more storage space, faster provisioning of storage and occasionally better performance. Storage admins and managers are looking for ways to give users what they want while trying to reduce costs and to go home on time for once (that includes not having to log in from home to fix something).

The current economy presents the really big challenge in selecting your next storage project; having enough people and time to be able to even endeavor on the project. How can you address the screams, justify the project and come up with the manpower to get the job done?

If you are really stretched thin on staffing, big projects may be out of the question and right now you may want to look at what I call edge projects to get you through the lean times, quell user demands and maybe just solve the problem for good. An edge project basically adds to your existing environment to address an issue instead of completely overhauling it. It should be able to be completed quickly and it's use should be transparent and require little change in day-to-day operations.

For example adding a deduplication appliance to your backup system as opposed to replacing your backup application with a new one that has deduplication built in. Then as we discuss in "Deduplication Means Affordable DR" possibly using that deduplication system to sure up your disaster recovery efforts instead of implementing a totally new realtime DR solution.

Another great example is adding an SSD PCI-E Card to fix a specific performance problem as we discussed in a recent entry. Drop it in the server, move the application data to the card and witness a dramatic increase in performance. All done with little disruption to operations while installing the card and moving the data and no additional ongoing management time spent. Yet the problem is eliminated.

There are a host of solutions that are ideal for these types of edge projects; the backup and SSD examples mentioned above, adding capabilities to your virtualization environment or capacity optimization techniques like compression and deduplication. They may be just the thing to get you through and may even solve the problem, permanently. There are times however, even when staffing is scarce and money is tight, that you need to undertake a big storage project to fix the problem. In our next entry we will discuss some ideas for getting that project approved and how to go about implementing in.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
According to industry estimates, about a million new IT security jobs will be created in the next two years but there aren't enough skilled professionals to fill them. On top of that, there isn't necessarily a clear path to a career in security. Dark Reading Executive Editor Kelly Jackson Higgins hosts guests Carson Sweet, co-founder and CTO of CloudPassage, which published a shocking study of the security gap in top US undergrad computer science programs, and Rodney Petersen, head of NIST's new National Initiative for Cybersecurity Education.