News
8/18/2008
01:56 PM
George Crump
George Crump
Commentary
50%
50%

The Death Of Storage Hardware

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.No manufacturer can make their lab identical to every data center that their solution will be installed in. To eliminate this variable, manufacturers have developed appliances with their solution preinstalled on them. If you look under the covers of most of these appliances, there's really not much special to them. Typically they're just off-the-shelf hardware, probably running Linux in some form. The special part is that it's a "known," and no longer a variable. Every system they provide has the same memory, processors, network I/O cards, etc. The result is that these solutions are up and running faster, with fewer support calls back to the manufacturer. Everybody wins.

Variable elimination isn't perfect. The challenge with appliances is that it costs the manufacturers money and at some point they have to change the hardware to keep up with processing upgrades and network I/O upgrades. When there is a platform refresh it also causes challenges within your data center. First you have to allow a potentially foreign platform manufacturer into your data center, or, even more ironically, you may pay extra for a platform that you already have. You also need power, cooling, and rackspace for the appliance. As server virtualization becomes common and, in fact, integrated into the OS, why can't the manufacturers simply provide images? This still delivers a common platform for them to support -- the hypervisor -- keeping support costs down. This can be delivered as a server image that can be installed into the virtualization OS. True, you would have to learn how to get the image loaded and start the virtual machine. It might cause some extra steps on the networking side, but these struggles are far offset by having a solution that can be delivered simply and without using additional power, cooling, or rackspace. Storage hardware manufacturers can and will eventually participate in this situation, and some already are. There are a few manufacturers that already allow their software to run as a virtual machine. There are a few that will allow other virtual machines to run on their appliances. Realistically, there will be a need for customized hardware for storage performance for the foreseeable future. The unique hardware requirement will be the shelf itself; the software IP can live as a series of virtual machines on a group of Virtualization hosts.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1978
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Simple PHP Agenda 2.2.8 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) add an administrator via a request to auth/process.php, (2) delete an administrator via a request to auth/admi...

CVE-2015-0741
Published: 2015-05-21
Multiple cross-site request forgery (CSRF) vulnerabilities in Cisco Prime Central for Hosted Collaboration Solution (PC4HCS) 10.6(1) and earlier allow remote attackers to hijack the authentication of arbitrary users, aka Bug ID CSCut04596.

CVE-2015-0742
Published: 2015-05-21
The Protocol Independent Multicast (PIM) application in Cisco Adaptive Security Appliance (ASA) Software 9.2(0.0), 9.2(0.104), 9.2(3.1), 9.2(3.4), 9.3(1.105), 9.3(2.100), 9.4(0.115), 100.13(0.21), 100.13(20.3), 100.13(21.9), and 100.14(1.1) does not properly implement multicast-forwarding registrati...

CVE-2015-0746
Published: 2015-05-21
The REST API in Cisco Access Control Server (ACS) 5.5(0.46.2) allows remote attackers to cause a denial of service (API outage) by sending many requests, aka Bug ID CSCut62022.

CVE-2015-0915
Published: 2015-05-21
Cross-site scripting (XSS) vulnerability in RAKUS MailDealer 11.2.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted attachment filename.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.