01:56 PM
George Crump
George Crump

The Death Of Storage Hardware

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.

My former boss, who is still a mentor today, had a saying: "Success in life is the elimination of variables." Words to live by and words that the storage community must have heard. The biggest variable they deal with when installing a solution into their environment is the variable of, well, their environment.No manufacturer can make their lab identical to every data center that their solution will be installed in. To eliminate this variable, manufacturers have developed appliances with their solution preinstalled on them. If you look under the covers of most of these appliances, there's really not much special to them. Typically they're just off-the-shelf hardware, probably running Linux in some form. The special part is that it's a "known," and no longer a variable. Every system they provide has the same memory, processors, network I/O cards, etc. The result is that these solutions are up and running faster, with fewer support calls back to the manufacturer. Everybody wins.

Variable elimination isn't perfect. The challenge with appliances is that it costs the manufacturers money and at some point they have to change the hardware to keep up with processing upgrades and network I/O upgrades. When there is a platform refresh it also causes challenges within your data center. First you have to allow a potentially foreign platform manufacturer into your data center, or, even more ironically, you may pay extra for a platform that you already have. You also need power, cooling, and rackspace for the appliance. As server virtualization becomes common and, in fact, integrated into the OS, why can't the manufacturers simply provide images? This still delivers a common platform for them to support -- the hypervisor -- keeping support costs down. This can be delivered as a server image that can be installed into the virtualization OS. True, you would have to learn how to get the image loaded and start the virtual machine. It might cause some extra steps on the networking side, but these struggles are far offset by having a solution that can be delivered simply and without using additional power, cooling, or rackspace. Storage hardware manufacturers can and will eventually participate in this situation, and some already are. There are a few manufacturers that already allow their software to run as a virtual machine. There are a few that will allow other virtual machines to run on their appliances. Realistically, there will be a need for customized hardware for storage performance for the foreseeable future. The unique hardware requirement will be the shelf itself; the software IP can live as a series of virtual machines on a group of Virtualization hosts.

Track us on Twitter:

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-08
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Published: 2015-10-08
Cybozu Garoon 3.x through 3.7.5 and 4.x through 4.0.3 mishandles authentication requests, which allows remote authenticated users to conduct LDAP injection attacks, and consequently bypass intended login restrictions or obtain sensitive information, by leveraging certain group-administration privile...

Published: 2015-10-08
The REST interface in Cisco Unified Communications Manager IM and Presence Service 11.5(1) allows remote attackers to cause a denial of service (SIP proxy service restart) via a crafted HTTP request, aka Bug ID CSCuw31632.

Published: 2015-10-08
Cisco Wireless LAN Controller (WLC) devices with software 7.0(240.0), 7.3(101.0), and 7.4(1.19) allow remote attackers to cause a denial of service (device outage) by sending malformed 802.11i management data to a managed access point, aka Bug ID CSCub65236.

Published: 2015-10-06
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.