Controlled Explosion: Big Data and The Cloud

Controlled Explosion: Big Data and The Cloud

You can’t stop the massive growth in data, but you can do a better job of managing it

IT departments are beginning to shift their focus from adding more storage to improving the efficiency of the storage systems already in place. Today, the name of the game is improving productivity and efficiency.

Storing and managing a large – and ever-increasing – amount of data presents a formidable business challenge. “Data volume is growing faster than IT budgets and faster than technology is evolving to solve the problem,” says Sanjeet Singh, a product marketing manager at Dell. Midsized companies are particularly challenged, because they typically lack the resources (both money and manpower) to handle the deluge.

Three Pillars of Data Management Efficiency

With infrastructure budgets under constant pressure, IT departments are beginning to shift their focus from adding more storage to improving the efficiency of the storage systems already in place. Today, the name of the game is improving productivity and efficiency while eliminating waste.

Indeed, many analysts predict strong growth for technologies that help midsized companies increase efficiency and get greater business value from their data storage investments. Some technology providers have zeroed in on three pillars of efficiency that bring almost immediate relief from the cost, complexity and administration of data management:

1. Consolidation

Server-attached storage has limited space for disk drives, which means when IT departments need more storage, they’re forced to purchase another server. This yields isolated storage “islands” that are difficult and costly to manage because  the systems must be updated and maintained individually. “Companies throw servers into their environment not because they need more horsepower but because they need more storage,” says Steve Arrington, product marketing strategist at Dell. “Then they have to hire more people to manage all this stuff.”

Consolidating resources in a virtualized storage area network, or SAN, allows companies to break free from the constraints of server-attached storage. It separates data management from servers, which allows IT to speed up operations like backup, retrieval and archiving because the tasks don’t compete for system resources. A SAN can be used to mirror information at remote locations, ensuring quick recovery in the event of an outage. And the prices of SAN-based technologies such as iSCSI have dropped, making them more viable options for financially constrained midsized companies.

Storage resources can also be consolidated in a network-attached storage (NAS) environment. IT departments should consider cost, distance between offices, and number of users when choosing between a SAN or NAS.

When storage resources are consolidated into a single pool, IT managers can store more data on fewer drives, which use less power and require less physical space.

The benefits over direct-attached storage are clear:

  • lower cost per megabyte of stored data
  • no single point of failure
  • centralized data means less administration
  • greater disk utilization
  • network-wide storage management
  • scalability; can add capacity without taking system offline
  • supports many operating systems

2 . Deduplication

Data duplication (unnecessarily storing multiple copies of the same data) is a big drain on storage resources. It wastes capacity, creates longer backup windows, slows down retrieval and generates more management overhead. According to one data management consultant, duplication rates of up to 30 percent are not uncommon among companies with no formal master data management plan. (And what midsized company has one of those?)…

Register To Continue Reading

Sorry, comments are closed for this post.

Comic
Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Pitney Bowes Selects Aria Systems for Billing on the New Commerce Cloud

Top-Ranked Cloud Billing Company Enables Greater Speed and Frictionless Billing for Unparalleled Customer Experience San Francisco, CA – August 23, 2016 – Aria Systems, which helps enterprises grow subscription and usage-based revenue, today announced that Pitney Bowes has selected Aria’s cloud-based monetization platform as the key billing and monetization component of their new Commerce Cloud…

The Golden Age of Wearable Technology

The Golden Age of Wearable Technology

The Golden Age One of the biggest fads in the technology sector right now is wearable tech. From Smartwatches that let you check your emails, chat with friends and search the web, to fitness accessories that monitor your heart rate and your sleep patterns, this is truly the Golden Age of wearable technology. But some…

Marketing Execs Beefing Up on Martech Strategies

Marketing Execs Beefing Up on Martech Strategies

Martech Strategies As budgets shift from traditional marketing streams to marketing technology, it’s essential that both marketers and business leaders understand marketing technology and keep up with the developments. According to eMarketer, 78% of US senior marketers surveyed believe gaining this understanding of marketing technology is increasingly relevant to their success, and the majority of…

4 Monetization Models For The Digital Business Era

4 Monetization Models For The Digital Business Era

4 Monetization Models Digital business is expected to generate billions in new revenue in the next four to five years. However, MGI Research predicts that digital businesses will need to increase their time to market by 40 percent. Many global executives admit they are unprepared to monetize their operations. The million dollar question is: how…

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

Cybersecurity Experts Racing to Keep Pace with Growing Cyber Threats

The cyberwar is on! At this stage of the game, the stakes are higher than ever, and safeguarding networks from cyberattacks is a devilish combination of Chicken and Cat-and-Mouse. Attacks are now so commonplace that many events of serious cybersecurity breaches go uncovered by mainstream media. Despite the rapid advancements in IT security technology, hackers…

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Has Arrived

Multi-Cloud Integration Speed, flexibility, and innovation require multiple cloud services As businesses seek new paths to innovation, racing to market with new features and products, cloud services continue to grow in popularity. According to Gartner, 88% of total compute will be cloud-based by 2020, leaving just 12% on premise. Flexibility remains a key consideration, and…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

How Your Startup Can Benefit From Cloud Computing And Growth Hacking

Ambitious Startups An oft-quoted statistic, 50% of new businesses fail within five years. And the culling of startups is even more dramatic, with an estimated nine out of ten folding. But to quote Steve Jobs, “I’m convinced that about half of what separates the successful entrepreneurs from the non-successful ones is pure perseverance.” So while…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills That Could Make Or Break Your IT Career

5 Essential Cloud Skills Cloud technology has completely changed the infrastructure and internal landscape of both small businesses and large corporations alike. No professionals in any industry understand this better than IT pros. In a cutthroat field like IT, candidates have to be multi-faceted and well-versed in the cloud universe. Employers want to know that…

Cloud Infographic – The Internet Of Things In 2020

Cloud Infographic – The Internet Of Things In 2020

The Internet Of Things In 2020 The growing interest in the Internet of Things is amongst us and there is much discussion. Attached is an archived but still relevant infographic by Intel which has produced a memorizing snapshot at how the number of connected devices have exploded since the birth of the Internet and PC.…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Against You?

Will Your Internet of Things Device Testify Imagine this:  Your wearable device is subpoenaed to testify against you.  You were driving when you were over the legal alcohol limit and data from a smart Breathalyzer device is used against you. Some might argue that such a use case could potentially safeguard society. However, it poses…