Welcome!

@CloudExpo Authors: Elizabeth White, Ed Featherston, Liz McMillan, Pat Romanski, William Schmarzo

Related Topics: SYS-CON MEDIA, Containers Expo Blog

SYS-CON MEDIA: Blog Post

Disk May Be Cheap but Storage is Not

Disks that make up an enterprise-class storage network may be cheap(er) but the management and security is just as expensive

Virtualization Magazine Journal

Remember at trade shows oh, a few years back now, the “hot” vendor swag was 256MB USB keys? I’m sure many of you spent time trying to collect them as fervently as kids collect Pokeman cards (or whatever the CCG du jour may be). Just a few years later you’d have laughed if someone offered such a small key up as swag because disk had become so cheap they were probably dumping what was left in stock in those “claw-grab” games that promise big prizes for only 50 cents a try that are the bane of every parent I know.

Disk, so they say, is cheap. And they’re right. Amazingly cheap, in fact.

But storage, storage is not cheap.

Oh, the disks that make up an enterprise-class storage network may be that cheap(er) but the management, the security, the backups, and the networks needed to support access to that “cheap disk” is just as expensive as any other enterprise-class technology. Organizations spend hundreds of thousands – even millions – of dollars to ensure that they have reliable storage for myriad reasons. There’s the general requirement for storage of all those Power Point presentations, Word documents, and Excel spreadsheets; both those that are used on a regular basis and those that sit, gathering electronic dust for years but ultimately contain information not only pertinent but important to the business. There’s the storage needed for the many databases that house customer and partner data, orders and financials, human resources and other business-related information. There’s backups and now virtual images that consume even larger quantities of disk not only at the corporate data center but at remote offices around the globe.

Someone, somehow, has to manage all that storage. Has to ensure that e-mail archives for the past seven years are accessible, just in case. Has to move files around as the disks age and performance requirements demand faster access to some data over others. Has to fill out the spreadsheet that tells users on what filesystem they can find the virtual image of WebSphere and that sales spreadsheet from last quarter – and pray that it’s always accurate.

There is a better way, of course. File and storage virtualization technologies were designed to make most of the management and maintenance associated with storage easier and, in the process, less expensive. For example, automated storage tiering strategies can automatically move less frequently accessed files to less expensive storage arrays while moving more frequently accessed files to faster, more expensive storage. Automating such processes mean administrators need not manually determine which file goes where, or optimize storage based on performance and cost by pulling out a slide ruler and calculating costs per megabyte. The system automatically determines how to best utilize the storage based on cost and performance and acts on behalf of the storage administrator, like a digital storage maid service that never needs to be reminded to sweep the floor.

And that spreadsheet mapping file systems to files for users? Global namespaces provided by a file virtualization system eliminate the problem entirely. Users need only remember one server name and can browse to their hearts content to find what they need after that. It’s all there, on what appears to be a unified storage system but in reality is comprised of many disjointed storage systems across the enterprise.

Because file virtualization solutions make the best use of all the file systems they “virtualize” via unification, they also optimize how files are stored and where and make the best use of all available storage – even if it might be unused space on a system used for other purposes. File virtualization solutions reduce the total cost of storage across the enterprise and organizations implementing such solutions ultimately see a payback on their investment in less time than you might imagine.

In fact, according to our just released TechValidate survey, a startling number (53%) of implementations say payback of their investment in as little as 12 months. The survey also showed that more than half of organizations saw a large reduction in capital expenditures as well as an impressive (20%) reduction in their storage budgets.

You can read more about the results of the TechValidate survey here and more about the coolness and benefits of file virtualization from Don in his “Reasons You Need File Virtualization” series.

More Stories By Holly Hagerman

As a senior partner at Connect Public Relations, Holly Hagerman directs public relations processes within the organization and provides strategic counsel to our clients. Hagerman has more than 17 years of experience leading strategic PR programs for network infrastructure, PC peripheral and telecommunications companies, including Lexmark International, Internet Security Systems, F5 Networks, AskMe.com, Efficient Networks, and Siemens Information and Communication Networks. Hagerman specializes in developing communication programs that reach diverse audiences -- from business and financial media to industry influencers and vertical market media. She has vast experience building multi-faceted PR programs that include executive visibility, message development, media and analyst relations, product evaluations, corporate profiles, IPOs, and acquisitions.

@CloudExpo Stories
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...