Saving Storage Dollars -- Manual MovesSaving Storage Dollars -- Manual Moves
With the current financial news, IT professionals are looking for ways to keep budgets flat. There is a common misconception in storage that there is only so much you can do. Over the next several entries, we'll explore a host of options that you can implement to curb storage costs. Today, it's manual moves.
October 13, 2008
With the current financial news, IT professionals are looking for ways to keep budgets flat. There is a common misconception in storage that there is only so much you can do. Over the next several entries, we'll explore a host of options that you can implement to curb storage costs. Today, it's manual moves.The initial focus of storage cost reduction should be optimizing the capacity of primary storage and then getting that data off primary storage. We touched on primary storage optimization in the last entry, and we've discussed disk-based archiving at length as well as several methods to move data to that archive. One method that I haven't discussed which disk archives specifically enables is manual moves.
While I recommend using a software application to help you find and identify old data, with a disk archive solution you can easily get this older data off primary storage with a simple manual move of that data.
A manual move is exactly what it says, identifying older data and via the OS moving that data to the archive. The other manual part is the user interaction with the archive.
With the data movement methods we have talked about in the past -- global file systems, agent movers, or agentless movers -- the user access to the old data is transparent. In other words, users don't have to know where the old data is because the movers handle the linkage.
In a manual move, they have to know where that old data is or at least YOU do. Don't panic. Remember, this data was moved for a reason; it wasn't being accessed. Chances are very high that it won't be accessed again ... ever. That said, you have to provide your users some guidance on how to locate this old data.
One way to communicate this is to leverage the way you currently describe where user data is today: home directories. Establish a share called "Archive" and simply tell users that if they can't find an old file in their home directory to look in the archive directory. On the archive share, recreate the user's directory structure as you perform your manual moves.
Many users can navigate between the two storage areas with no problem. If they can, that means a big savings in software for the organization. If they don't, it means a support call to you. If you measure the likeliness of this call happening and the soft cost to help the user, it still may be less expensive to the organization than buying a data movement solution.
A disk archive is the key enabler of manual moves; with tape, you have to manage a robot and a tape library. While that can be scripted, it's outside the scope of most of us. Disk archive is just another file system, one that scales and is designed to retain data. Moving data to a file system is well within the scope of most IT professionals.
Track us on Twitter: http://twitter.com/storageswiss.
Subscribe to our RSS feed.
George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.
About the Author(s)
You May Also Like
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks