10:30 AM
George Crump
George Crump

Selecting Your Next Storage Project - Edge Projects

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?

Unfortunately the reality is often that the storage project you are going to work on next is based on the one that users are screaming the loudest for that you can also afford and it usually contains "add capacity". Is there a better way to go about selecting your next storage project?Project selection has to be representative of what users need or are asking for, but this has to be balanced with the needs of the overall data center and frankly the IT staff itself. I find that users are often calling for more storage space, faster provisioning of storage and occasionally better performance. Storage admins and managers are looking for ways to give users what they want while trying to reduce costs and to go home on time for once (that includes not having to log in from home to fix something).

The current economy presents the really big challenge in selecting your next storage project; having enough people and time to be able to even endeavor on the project. How can you address the screams, justify the project and come up with the manpower to get the job done?

If you are really stretched thin on staffing, big projects may be out of the question and right now you may want to look at what I call edge projects to get you through the lean times, quell user demands and maybe just solve the problem for good. An edge project basically adds to your existing environment to address an issue instead of completely overhauling it. It should be able to be completed quickly and it's use should be transparent and require little change in day-to-day operations.

For example adding a deduplication appliance to your backup system as opposed to replacing your backup application with a new one that has deduplication built in. Then as we discuss in "Deduplication Means Affordable DR" possibly using that deduplication system to sure up your disaster recovery efforts instead of implementing a totally new realtime DR solution.

Another great example is adding an SSD PCI-E Card to fix a specific performance problem as we discussed in a recent entry. Drop it in the server, move the application data to the card and witness a dramatic increase in performance. All done with little disruption to operations while installing the card and moving the data and no additional ongoing management time spent. Yet the problem is eliminated.

There are a host of solutions that are ideal for these types of edge projects; the backup and SSD examples mentioned above, adding capabilities to your virtualization environment or capacity optimization techniques like compression and deduplication. They may be just the thing to get you through and may even solve the problem, permanently. There are times however, even when staffing is scarce and money is tight, that you need to undertake a big storage project to fix the problem. In our next entry we will discuss some ideas for getting that project approved and how to go about implementing in.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Who Does What in Cybersecurity at the C-Level
Steve Zurier, Freelance Writer,  3/16/2018
New 'Mac-A-Mal' Tool Automates Mac Malware Hunting & Analysis
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/14/2018
Microsoft Report Details Different Forms of Cryptominers
Kelly Sheridan, Staff Editor, Dark Reading,  3/13/2018
Register for Dark Reading Newsletters
White Papers
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.