Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:50 AM
George Crump
George Crump

Your Storage Has To Do More With Less, Too

Sick of the phrase "Do more with less"? How about putting the pressure on your storage system? If you have to do more with less, it should at least carry some of the responsibility.

Sick of the phrase "Do more with less"? How about putting the pressure on your storage system? If you have to do more with less, it should at least carry some of the responsibility.This means that storage systems have to become easier to use, easier to scale, and smarter about managing storage. The first step in the process is virtualization. LUN design, while possibly a valuable skill, just doesn't scale into the do more with less model. Storage virtualization allows you to just create capacity and then let the storage system manage where to put the data. Virtualization can be the core capability of a new system like those offered by 3Par, Compellent, or Xiotech, and virtualization can also be added to your existing storage by using an appliance like those offered by NetApp or DataCore.

While there may be some concern about losing performance because you can't fine-tune the LUN to the existing needs of your database, in tests that I have seen virtualized systems outperformed nonvirtualized systems and did so with less fine-tuning and at a cheaper price point.

Virtualized storage also is a key enabler to true thin provisioning. While many vendors have jumped on the thin-provisioning bandwagon, in most cases they are really using more of an automated volume growth, which still wastes disk capacity. As thin provisioning matures, we are seeing vendors like 3Par and Symantec develop a 2.0 set of capabilities which includes the ability to reclaim disk space. Without reclamation, thin-provisioned volumes can "give back" their disk space when files are deleted from them.

Beyond virtualization, storage has to become more intelligent. For example, domains of storage should have the ability to be created so the management of different sub-sections of that storage can be managed by separate individuals, as we discuss in our article on "Virtual Domains." These virtual domains allow for delegation of the storage management process without compromising the integrity of the overall storage system.

The real key is automation; storage needs to have the intelligence to respond to the demands of the business. In a do more with less world, asking the business to wait while the storage manager stops to design LUNs, tries to find capacity, or becomes the single point of bottleneck in deployment is no longer acceptable, but then neither is asking a single storage manager to respond to the needs of today's business with 10-year-old storage management techniques.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-17
A local file inclusion vulnerability was discovered in the captcha function in Monstra 3.0.4 which allows remote attackers to execute arbitrary PHP code.
PUBLISHED: 2021-06-17
An Out-of-Bounds Read was discovered in arch/arm/mach-footbridge/personal-pci.c in the Linux kernel through 5.12.11 because of the lack of a check for a value that shouldn't be negative, e.g., access to element -2 of an array, aka CID-298a58e165e4.
PUBLISHED: 2021-06-17
Affected versions of Octopus Server are prone to an authenticated SQL injection vulnerability in the Events REST API because user supplied data in the API request isn’t parameterised correctly. Exploiting this vulnerability could allow unauthorised access to database tables.
PUBLISHED: 2021-06-17
Quassel through 0.13.1, when --require-ssl is enabled, launches without SSL or TLS support if a usable X.509 certificate is not found on the local system.
PUBLISHED: 2021-06-17
A use-after-free issue exists in the DGN file-reading procedure in the Drawings SDK (All versions prior to 2022.4) resulting from the lack of proper validation of user-supplied data. This can result in a memory corruption or arbitrary code execution, allowing attackers to cause a denial-of-service c...