Cloud
11/12/2008
10:13 AM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Will The Cloud Hurt Storage Companies?

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.First, what is cloud computing and cloud storage? In many ways it is the consolidation of small business and home users. Clearly there are cases where large companies are using cloud services, but for the most part it is small businesses. These are businesses that are too small for the storage systems manufacturers to cater to. The result of this consolidation of small businesses actually means more opportunities. If a cloud service provider consolidates the computing and storage of thousands of small businesses that are too small for these storage players to sell to into one large customer, that is a net gain for these companies.

Second, there is an assumption that cloud services will be the sole domain of a few big players. This will certainly not be the case, at least not initially. If cloud computing and cloud storage really catch on and grow like some analysts believe, there will be too many cloud service providers. Each of these will need to select a storage system based on their needs and business model. Most will buy a combination of fast online storage from the providers mentioned above and archive storage from companies like Permabit, Copan Systems, and Nexsan.

Third, cloud computing is an ideal use case for virtualized storage as provided by these manufacturers. Virtual storage's ability to provision on the fly, scale as the I/O and capacity needs demand while keeping the management of the system easy, are critical for the scale-out business model that a successful cloud services company will possess.

The other suggestion is that cloud service providers will take the route of Google and Amazon and create their own storage infrastructure. New entrants to cloud services will not have the resources or the need to roll their own solution. If, as a cloud service provider, you can remain cost effective without having to invest engineering resources in developing and, more important, supporting a customer storage platform, why would you? It makes more sense to focus on your core service.

What about the big storage players? They each now offer some sort of cloud storage play. Wouldn't it make sense to get all the storage types from a single manufacturer? It might, but there may be a stronger case in the cloud market for best of breed at each tier. Regardless, the challenge that the larger manufacturers face is that there is little to no integration between their cloud storage offerings and their other storage offerings. Other than logo's matching, what is the advantage?

Cloud service providers are typically going to have a heavy IT knowledge base internal to the company, they're going to understand the value of not reinventing the wheel and focus more on optimizing the asset.

Join us for our upcoming Webcast, Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-4448
Published: 2014-10-22
House Arrest in Apple iOS before 8.1 relies on the hardware UID for its encryption key, which makes it easier for physically proximate attackers to obtain sensitive information from a Documents directory by obtaining this UID.

CVE-2014-4449
Published: 2014-10-22
iCloud Data Access in Apple iOS before 8.1 does not verify X.509 certificates from TLS servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-4450
Published: 2014-10-22
The QuickType feature in the Keyboards subsystem in Apple iOS before 8.1 collects typing-prediction data from fields with an off autocomplete attribute, which makes it easier for attackers to discover credentials by reading credential values within unintended DOM input elements.

CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.