Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

3/5/2010
10:22 AM
George Crump
George Crump
Commentary
50%
50%

Replacing Storage? What To Look For

In our last entry, we discussed how the cost of out-year maintenance will cause you to look for another storage vendor and based on the comments and emails, we struck a nerve. Beyond that issue though what else will make you switch storage vendors?

In our last entry, we discussed how the cost of out-year maintenance will cause you to look for another storage vendor and based on the comments and emails, we struck a nerve. Beyond that issue though what else will make you switch storage vendors?What are some of the capabilities you should be looking for in your next storage system? In general there is no single feature that is constant across the board. It will vary from data center to data center. Clearly most sites are looking to drive down costs and improve performance. Most vendors will claim to offer that; you will want to dig deeper.

We typically suggest that the first capability to consider is will this system make you more efficient in managing storage. As we know all too well storage capacity and performance demands are growing everyday. One of the best ways to combat this is to look for systems that are automated. That takes some of the storage management burden off of your back and handle it themselves. This means tasks like provisioning, performance optimization and even drive repair should be able to be handled automatically by the system. In short it should just work. You should no longer have to babysit your storage you should be able to manage it.

Second a new system should not require more capacity than your current system. Several vendors now are advancing thin provisioning to the point that it can also perform a thin migration. Thin provisioning means that when you create a new volume on the storage area it only claims physical space on the drives as data is actually written to them. The problem in the past has been, as we describe in our Thin Provisioning White Paper, this capability has only worked on net new volumes. When you migrated old volumes from an existing array, you typically do a block copy and that means blocks of deleted data and empty space were copied over as well. New storage systems and some modern volume managers have the ability to zero out and identify these areas during the migration. As a result saving capacity during the migration and making fat volumes thin. A few vendors are now providing a guarantee around about this capability. This will reduce your new capacity requirement by X% when you convert to their storage system. Take advantage of those offers.

The final capability to look for is automated tiering, the ability to move data from one storage type to another. For example migrating active data to Solid State Disk (SSD) or inactive data to SATA. Since the early days of Hierarchical Storage Management (HSM) and later Information Lifecycle Management (ILM) we have been trying to figure out how to correctly leverage different types of storage. Now with SSD we have more storage types than ever and of course the quantity of data and number of files to manage have grown significantly. Automated tiering allows the storage system, with override from you, to make the decisions on where to place the data. This is especially critical in SSD, where because of its premium cost, you want to keep it full and only have the most active data on it.

These are just three suggestions of capacities to look for. Don't consider it an all inclusive list nor as a must have list. For many data centers these should be on the list but there can be compelling reasons to live without one of them. Sometimes you don't have the budget for a new storage system. In our next entry we will explore how to get these capabilities by enhancing instead of replacing your current storage system.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-20327
PUBLISHED: 2021-02-25
A specific version of the Node.js mongodb-client-encryption module does not perform correct validation of the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Node....
CVE-2021-20328
PUBLISHED: 2021-02-25
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in inte...
CVE-2020-27543
PUBLISHED: 2021-02-25
The restify-paginate package 0.0.5 for Node.js allows remote attackers to cause a Denial-of-Service by omitting the HTTP Host header. A Restify-based web service would crash with an uncaught exception.
CVE-2020-23534
PUBLISHED: 2021-02-25
A server-side request forgery (SSRF) vulnerability in Upgrade.php of gopeak masterlab 2.1.5, via the 'source' parameter.
CVE-2021-27330
PUBLISHED: 2021-02-25
Triconsole Datepicker Calendar <3.77 is affected by cross-site scripting (XSS) in calendar_form.php. Attackers can read authentication cookies that are still active, which can be used to perform further attacks such as reading browser history, directory listings, and file contents.