Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

11/12/2009
02:45 PM
George Crump
George Crump
Commentary
50%
50%

Data Thinkage

Data storage capacity is cheap. For most environments obtaining enough capacity is no longer a challenge, it is managing that capacity that becomes the problem. Growth, especially in unstructured data, continues unabated. Deciding what data should be where is one of the biggest challenges that the storage manager has to face today. Users don't want to think about where data should be stored and storage managers don't have the time to think about it.

Data storage capacity is cheap. For most environments obtaining enough capacity is no longer a challenge, it is managing that capacity that becomes the problem. Growth, especially in unstructured data, continues unabated. Deciding what data should be where is one of the biggest challenges that the storage manager has to face today. Users don't want to think about where data should be stored and storage managers don't have the time to think about it.The good news is today with disk archiving and MAID based storage systems you can store data in a cost effective fashion for a very long time. Scale and power efficiency, whichever is the higher priority, can be addressed by systems from companies like EMC, Nexsan, Permabit and others. The challenge is getting data to that system.

There is the manual method, basically using tools from companies like APTARE or Tek-Tools, to analyze the storage environment. Determine what files have not been accessed in a period of time and then move those files to one of the above secondary tiers of storage. There is a challenge in how you actually move that data and where the user goes to find the data once the move has been completed.

I also like that we are seeing some of the API sets from cloud providers like Nirvanix, Iron Mountain and others to eventually be able to do meta data tagging. When software applications support this a user should be able to set a migration and even retention policy at the point of creation. If we can get the users to take the extra step and provide the meta data information, this could be a big relief for storage managers.

Alternatively there is the concept of global file systems or file virtualization. While some manufacturers have this built into their NAS solutions like NetApp, others have a broader solution that supports multiple manufacturers. Companies like F5, AutoVirt and EMC's Rainfinity all provide this technology. Think of file virtualization as a DNS for files. You don't need to know a file's location, just its name.

These systems can be automatically based on file attributes like age or access and move data from one storage platform to another and do so transparently to the user. Something to be careful with is the level of granularity that the policy can be applied. Some file virtualization solutions are only granular to a folder level, meaning that the folder has to meet the policy, not the files within the folder.

In an effort to address the ever increasing types of data tiers available, data management is quickly evolving, manual tools are becoming easier to use, self service models are coming to market, and technologies like file virtualization that make the whole process transparent are maturing. Maybe data management won't require so much brain power in the future.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...