Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/12/2008
10:13 AM
George Crump
George Crump
Commentary
50%
50%

Will The Cloud Hurt Storage Companies?

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.

There have been a few articles written lately which claim cloud computing will hurt smaller storage companies like 3Par, Compellent, Xiotech, etc…. The theory being that there will have to be some industry consolidation. I disagree. Cloud computing should be a net gain for storage companies and here's why.First, what is cloud computing and cloud storage? In many ways it is the consolidation of small business and home users. Clearly there are cases where large companies are using cloud services, but for the most part it is small businesses. These are businesses that are too small for the storage systems manufacturers to cater to. The result of this consolidation of small businesses actually means more opportunities. If a cloud service provider consolidates the computing and storage of thousands of small businesses that are too small for these storage players to sell to into one large customer, that is a net gain for these companies.

Second, there is an assumption that cloud services will be the sole domain of a few big players. This will certainly not be the case, at least not initially. If cloud computing and cloud storage really catch on and grow like some analysts believe, there will be too many cloud service providers. Each of these will need to select a storage system based on their needs and business model. Most will buy a combination of fast online storage from the providers mentioned above and archive storage from companies like Permabit, Copan Systems, and Nexsan.

Third, cloud computing is an ideal use case for virtualized storage as provided by these manufacturers. Virtual storage's ability to provision on the fly, scale as the I/O and capacity needs demand while keeping the management of the system easy, are critical for the scale-out business model that a successful cloud services company will possess.

The other suggestion is that cloud service providers will take the route of Google and Amazon and create their own storage infrastructure. New entrants to cloud services will not have the resources or the need to roll their own solution. If, as a cloud service provider, you can remain cost effective without having to invest engineering resources in developing and, more important, supporting a customer storage platform, why would you? It makes more sense to focus on your core service.

What about the big storage players? They each now offer some sort of cloud storage play. Wouldn't it make sense to get all the storage types from a single manufacturer? It might, but there may be a stronger case in the cloud market for best of breed at each tier. Regardless, the challenge that the larger manufacturers face is that there is little to no integration between their cloud storage offerings and their other storage offerings. Other than logo's matching, what is the advantage?

Cloud service providers are typically going to have a heavy IT knowledge base internal to the company, they're going to understand the value of not reinventing the wheel and focus more on optimizing the asset.

Join us for our upcoming Webcast, Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
New 'Nanodegree' Program Provides Hands-On Cybersecurity Training
Nicole Ferraro, Contributing Writer,  8/3/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11937
PUBLISHED: 2020-08-06
In whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.
CVE-2020-15114
PUBLISHED: 2020-08-06
In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access. However, it is possible to include the gateway address as an endpoint. This results in a denial of service, since the endpoint can become stuck in a loop of requesting i...
CVE-2020-15136
PUBLISHED: 2020-08-06
In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records. When starting a gateway, TLS authentication will only be attempted on endpoints identified in DNS SRV records for a given domain, which occurs in the discoverEndpoints func...
CVE-2020-15701
PUBLISHED: 2020-08-06
An unhandled exception in check_ignored() in apport/report.py can be exploited by a local attacker to cause a denial of service. If the mtime attribute is a string value in apport-ignore.xml, it will trigger an unhandled exception, resulting in a crash. Fixed in 2.20.1-0ubuntu2.24, 2.20.9-0ubuntu7.1...
CVE-2020-15702
PUBLISHED: 2020-08-06
TOCTOU Race Condition vulnerability in apport allows a local attacker to escalate privileges and execute arbitrary code. An attacker may exit the crashed process and exploit PID recycling to spawn a root process with the same PID as the crashed process, which can then be used to escalate privileges....