Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/10/2010
09:09 AM
George Crump
George Crump
Commentary
50%
50%

Extending Your Storage

In our last entry we discussed what to look for in a new storage system. But what if you don't have the budget for a new storage system or your current system is not old enough that you dare bring up the subject of replacing it? The alternative is to look for solutions that can extend the usefulness of what you currently have.

In our last entry we discussed what to look for in a new storage system. But what if you don't have the budget for a new storage system or your current system is not old enough that you dare bring up the subject of replacing it? The alternative is to look for solutions that can extend the usefulness of what you currently have.Typically you need to extend your storage for one of three reasons; more performance, more capacity or simpler management. Performance, especially with affordable SSD technology, looks to be the easiest to address. Looks can be deceiving though. For SSD to work the performance bottleneck must be at the storage mechanism itself. Everything else; the servers, the HBAs and the storage network must be operating at peak performance. An analysis tool either in the OS or from a third party is an ideal investment to make sure that you are using the resources that you have at your disposal prior to an investment in SSD.

If you determine that SSD can help you there are two basic choices today. The first is a specific SSD drive. These are ideal when addressing a small problem data set that can be moved to the SSD. Alternatively there are the automated tiering systems or caching systems that are available. While many of the manufacturers are offering these as part of a new system, there are a few vendors offering them as add-on's to existing storage infrastructures. As we discussed in our recent entry over at Network Computing, these systems can either come in the form of a caching appliance that sits in front of your SAN or NAS accelerating I/O or it can be a file virtualization appliance that more permanently moves data between discrete tiers of storage.

If you have more of a capacity issue, you have two basic options. The first is to shrink what you have either through deduplication and/or compression. At this point most of these options are available only for file systems or NAS. In these environments there are several options to either compress data in real time or to deduplicate data. Compression does have the advantage of being universally useful. Almost all data compresses. Deduplication is only going to save space on redundant data. There are options to add both technologies to existing NAS environments.

The alternative with file systems is to archive this data to either a disk based archive or to a cloud based archive. While this does require an additional purchase of a new storage tier, it also has the advantages that we have discussed in the past like reducing the size of the actual data being backed up and building a foundation for compliance and data retention.

The other option in storage efficiency is to be able to apply thin provisioning as we discussed in our last entry. If your current storage system does not have the capability to thinly provision volumes then it can be added by continuing to leverage your current storage hardware but switching to a different storage software platform. We will look at these in our next entry when we will look at simplification. How can you make an existing storage system easier to use without getting a new one?

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20327
PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
CVE-2021-20328
PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
CVE-2020-27543
PUBLISHED: 2021-02-25
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.
CVE-2020-23534
PUBLISHED: 2021-02-25
A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
CVE-2021-27330
PUBLISHED: 2021-02-25
Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.