News
5/19/2009
10:30 AM
George Crump
George Crump
Commentary
50%
50%

Selecting Your Next Storage Project - Edge Projects

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?Project selection has to be representative of what users need or are asking for, but this has to be balanced with the needs of the overall data center and frankly the IT staff itself. I find that users are often calling for more storage space, faster provisioning of storage and occasionally better performance. Storage admins and managers are looking for ways to give users what they want while trying to reduce costs and to go home on time for once (that includes not having to log in from home to fix something).

The current economy presents the really big challenge in selecting your next storage project; having enough people and time to be able to even endeavor on the project. How can you address the screams, justify the project and come up with the manpower to get the job done?

If you are really stretched thin on staffing, big projects may be out of the question and right now you may want to look at what I call edge projects to get you through the lean times, quell user demands and maybe just solve the problem for good. An edge project basically adds to your existing environment to address an issue instead of completely overhauling it. It should be able to be completed quickly and it's use should be transparent and require little change in day-to-day operations.

For example adding a deduplication appliance to your backup system as opposed to replacing your backup application with a new one that has deduplication built in. Then as we discuss in "Deduplication Means Affordable DR" possibly using that deduplication system to sure up your disaster recovery efforts instead of implementing a totally new realtime DR solution.

Another great example is adding an SSD PCI-E Card to fix a specific performance problem as we discussed in a recent entry. Drop it in the server, move the application data to the card and witness a dramatic increase in performance. All done with little disruption to operations while installing the card and moving the data and no additional ongoing management time spent. Yet the problem is eliminated.

There are a host of solutions that are ideal for these types of edge projects; the backup and SSD examples mentioned above, adding capabilities to your virtualization environment or capacity optimization techniques like compression and deduplication. They may be just the thing to get you through and may even solve the problem, permanently. There are times however, even when staffing is scarce and money is tight, that you need to undertake a big storage project to fix the problem. In our next entry we will discuss some ideas for getting that project approved and how to go about implementing in.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading December Tech Digest
Experts weigh in on the pros and cons of end-user security training.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2010-5312
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in jquery.ui.dialog.js in the Dialog widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title option.

CVE-2012-6662
Published: 2014-11-24
Cross-site scripting (XSS) vulnerability in the default content option in jquery.ui.tooltip.js in the Tooltip widget in jQuery UI before 1.10.0 allows remote attackers to inject arbitrary web script or HTML via the title attribute, which is not properly handled in the autocomplete combo box demo.

CVE-2014-1424
Published: 2014-11-24
apparmor_parser in the apparmor package before 2.8.95~2430-0ubuntu5.1 in Ubuntu 14.04 allows attackers to bypass AppArmor policies via unspecified vectors, related to a "miscompilation flaw."

CVE-2014-7817
Published: 2014-11-24
The wordexp function in GNU C Library (aka glibc) 2.21 does not enforce the WRDE_NOCMD flag, which allows context-dependent attackers to execute arbitrary commands, as demonstrated by input containing "$((`...`))".

CVE-2014-7821
Published: 2014-11-24
OpenStack Neutron before 2014.1.4 and 2014.2.x before 2014.2.1 allows remote authenticated users to cause a denial of service (crash) via a crafted dns_nameservers value in the DNS configuration.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Now that the holiday season is about to begin both online and in stores, will this be yet another season of nonstop gifting to cybercriminals?