Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/23/2008
12:42 AM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Up To The Challenge?

Mask complexity, improve performance, and automate every last function possible -- those, in a giant nutshell, are the biggest engineering challenges for storage in the next several years, according to some big thinkers who've deployed a SAN or two in their time.

Mask complexity, improve performance, and automate every last function possible -- those, in a giant nutshell, are the biggest engineering challenges for storage in the next several years, according to some big thinkers who've deployed a SAN or two in their time.A few days ago, I mentioned the list drawn up by the National Academy of Engineering of the largest technical challenges of the next century. It got me wondering how storage experts whose opinions I trust might answer where this sector of IT's concerned. I also reached out to a few vendors to see where they are with their thinking. I'll post their responses next week.

In the meantime, here's what a power user, two long-time storage consultants, and a financial analyst identified as storage's biggest challenges. Everyone -- vendor and nonvendor alike -- cited the challenge of "greening up" storage -- reducing its carbon footprint and powering requirements.

Unified storage: A truly open, usable, standardized, storage 'grid' capability out-of-the-box for enterprise environments is the biggest desired technology breakthrough in the storage realm. It would be a marriage of virtual file systems, storage virtualization technologies, tiered storage mechanisms for attaining information life cycle management (ILM), dynamic on-demand provisioning, data de-duplication, and have built-in replication and DR (redundancy) capabilities as well as all the essential capabilities for data caching and levels of RAID to meet performance requirements. It would be a self-healing and re-routing infrastructure, distributed across multiple geographical locations (data centers) with enough intelligence to recover from any type of issue with minimal human intervention required (if at all).

-- Harold Shapiro, senior VP and CIO of Indieroad.net

Hardware and software interoperability: Meaning any storage management software product can run on any server/OS and manage any vendor's product/device. Disk formats are still unique for each OS! As of today, proprietary systems are still winning the war -- certain software only works with specific hardware. IT, and specifically the storage industry, along with the SNIA now, have been chasing true plug-and-play interoperability for nearly 20 years and it's still not there. The goal is for a single backup/recovery product to support the storage hardware on Unix, Linux, and Windows without having a specific backup/recovery product for each OS with different GUIs, screens etc.

-- Fred Moore, president, Horison Inc.

I/O aggregation and virtualization: Storage is very costly, because the protocols are all different for data, for storage, or for inter-server communication, requiring different adapters, cables, and technologies. If there were one device on top of the rack or in the blade chassis that aggregates all the I/O and directs it to the target devices, it would reduce overall cost significantly.

-- Kaushik Roy, research analyst, data center technologies, Pacific Growth Equities LLC

Improved price/performance: Make storage drives faster and cheaper, perhaps using single-cell flash solid state disks (SSDs) or some other new technology. Make storage systems faster in general -- storage performance has not kept up with capacity increases.

-- Marc Staimer, president, Dragonslayer Consulting

Mainframe-like management features: The storage and data management capabilities for Unix, Linux, and Windows may be 15 years to 20 years behind that of the mainframe. Specifically, the mainframe has the most powerful policy-based storage management engine ever developed, called DFSMS. This software (though not perfect) implements data classification, allows user policies to initiate proactive tasks such as optimized data placement, automatic backup/recovery, and HSM (Hierarchical Storage Management), which is key for effectively implementing tiered storage. Nonmainframe systems software suppliers are trying hard to offer mainframe-like functionality. For example, nonmainframe systems are just now implementing thin provisioning. This first appeared on a mainframe in 1965 with OS/360. HSM first appeared in 1975 and there is still no effective cross-platform HSM for Unix, Linux, and Windows.

-- Fred Moore

Fibre Channel over Ethernet (FCoE): What if a new type of enhanced Ethernet (aka Data-Center Ethernet or DCE) which utilizes Ethernet extensions to achieve the reliability and efficiency of Fibre Channel can be designed? If this can be done, then it would be possible to encapsulate Fibre Channel data within the Ethernet frame and thus meld storage, messaging, VoIP, video, and other data over the same "unified" physical network.

-- Kaushik Roy

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
CVE-2021-31660
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.