Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

4/19/2010
03:20 PM
George Crump
George Crump
Commentary
50%
50%

Increasing Storage Utilization Rates

In a recent entry by John Foley he discusses some of the pros and cons for leveraging cloud computing to increase IT efficiency in the Federal Government. One of the more startling statements is how low utilization of storage is. Of course low utilization is not the sole problem of Federal IT, the private sector has its challenges with storage utilization as well. What can be done to inc

In a recent entry by John Foley he discusses some of the pros and cons for leveraging cloud computing to increase IT efficiency in the Federal Government. One of the more startling statements is how low utilization of storage is. Of course low utilization is not the sole problem of Federal IT, the private sector has its challenges with storage utilization as well. What can be done to increase storage utilization rates?Increasing storage utilization can come in two areas; making the data you currently have more space efficient and making the capacity you have more efficient. Making the data you have more space efficient usually amounts to leveraging compression or deduplication or both. You can also manage the older data and migrate it off to less expensive and potentially optimized secondary storage. You can even migrate it to cloud storage. Technologies to migrate that data, like file virtualization or data optimization software with migration capabilities, are maturing rapidly, becoming more seamless and easier to use.

The problem however is how do you optimize your capacity? This is storage that has been hard assigned to a server but has not yet been consumed. It's that "little extra" you give to each server to keep from having to continuously provision more storage to that server. Thin provisioning has established itself as the ideal way to free up this captive capacity. Be careful though, thin provisioning is its most effective on its first day and on net new data. As data is deleted from the volume the system does not reclaim that capacity. Modern thin provisioning systems as we discussed in our white paper "Thin Provisioning Basics" have evolved to be able to overcome this weakness, reclamation can now be done with certain file systems and on second generation thin provisioning systems.

If you are like many data centers only 25% to 35% of your actual capacity is actually storing real data. If for some reason you added one of the above data optimization technologies then it may be an even lower percentage. As you know you simply can't turn drive shelves off. Most storage systems are designed to write data vertically across shelves for increased redundancy. There is typically no free shelf of storage.

These advanced thin provisioning systems are ideal when you are refreshing your legacy storage system, but what if you are not able to do so? If you have a legacy storage system with low utilization rates but no thin provisioning type of features, is there a downside? After all you have more than likely already bought and paid for the equipment. Why buy something new to get one capability?

There are downsides to not being able to increase utilization. First this wasted capacity may cause you to buy more storage capacity sooner than you should need to. Second you are paying to power and cool that additional capacity. Third that capacity is taking up additional floor space in your data center. Floor space that you probably need for something else. If you are anywhere close to the 25% utilization statistic, that means you can reduce purchases, power and cooling and floor space by as much as 75%. That alone may justify a sooner than planned storage refresh.

Over the next several entries we will cover how to get more utilization out of what you have, if your going to refresh what to look for and how to manually re-optimize a storage system to be able to power down parts of it.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.