News
8/18/2008
01:56 PM
George Crump
George Crump
Commentary
50%
50%

The Death Of Storage Hardware

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.No manufacturer can make their lab identical to every data center that their solution will be installed in. To eliminate this variable, manufacturers have developed appliances with their solution preinstalled on them. If you look under the covers of most of these appliances, there's really not much special to them. Typically they're just off-the-shelf hardware, probably running Linux in some form. The special part is that it's a "known," and no longer a variable. Every system they provide has the same memory, processors, network I/O cards, etc. The result is that these solutions are up and running faster, with fewer support calls back to the manufacturer. Everybody wins.

Variable elimination isn't perfect. The challenge with appliances is that it costs the manufacturers money and at some point they have to change the hardware to keep up with processing upgrades and network I/O upgrades. When there is a platform refresh it also causes challenges within your data center. First you have to allow a potentially foreign platform manufacturer into your data center, or, even more ironically, you may pay extra for a platform that you already have. You also need power, cooling, and rackspace for the appliance. As server virtualization becomes common and, in fact, integrated into the OS, why can't the manufacturers simply provide images? This still delivers a common platform for them to support -- the hypervisor -- keeping support costs down. This can be delivered as a server image that can be installed into the virtualization OS. True, you would have to learn how to get the image loaded and start the virtual machine. It might cause some extra steps on the networking side, but these struggles are far offset by having a solution that can be delivered simply and without using additional power, cooling, or rackspace. Storage hardware manufacturers can and will eventually participate in this situation, and some already are. There are a few manufacturers that already allow their software to run as a virtual machine. There are a few that will allow other virtual machines to run on their appliances. Realistically, there will be a need for customized hardware for storage performance for the foreseeable future. The unique hardware requirement will be the shelf itself; the software IP can live as a series of virtual machines on a group of Virtualization hosts.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "Better he's on the Internet than on the couch."
Current Issue
Understanding & Managing the Mobile Security Threat
Mobile devices are increasing IT security risk. Is your enterprise ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join us as Dark Reading editors speak with IT security hiring experts about improving IT career prospects.