* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download The Data Growth Problem
Clusterpoint wikipedia , lookup
Data Protection Act, 2012 wikipedia , lookup
Expense and cost recovery system (ECRS) wikipedia , lookup
Data center wikipedia , lookup
Forecasting wikipedia , lookup
Data analysis wikipedia , lookup
Data vault modeling wikipedia , lookup
Information privacy law wikipedia , lookup
Disk formatting wikipedia , lookup
Storage Optimization “RightStor” Your Data Agenda ● Objectives ● Cima’s Point of View ● The Data Growth Problem ● Data Lifecycle Progression ● Primary Data Storage Considerations ● Secondary Data Storage Considerations ● Topics for Discussion ● The Cima Approach ● Next Steps & Call to Action Objectives ● Educate our audience on the latest trends in data storage and data protection to encourage strategic decision making ● Serve as a means to stimulate thought and explore alternatives for selection of storage to process and protect valuable business data ● Convey the Cima Solutions Group approach to addressing our clients’ needs for reliable and efficient IT storage solutions which create financial value Cima’s Point of View ● Cima has seen evidence that businesses are making storage decisions using traditional approaches, without awareness of options that exist in the marketplace, and how those options have created opportunities for dramatic cost savings and increased levels of resiliency ● The rate of storage consumption is outpacing the reductions in cost, and therefore businesses will continue to spend more on storage if they employ their existing paradigms …RightStor Your Data RightStoring is the process of identifying the most efficient and cost effective location for storage and protection of corporate data The Data Growth Problem ● “There are 100 million Microsoft Office documents created every day” Forrester Research ● “Last year, 161 Exabytes of digital information were created, representing 3 million times the information in all the books ever written” IDC ● “58% of new corporate data growth is unstructured data such as Microsoft Office documents, set to grow at an annual rate of 96%” Taneja Group The exponential growth in data mandates that companies explore efficiencies in data storage and data protection The Data Lifecycle Progression - I ● All data progresses through a value continuum from creation to archival and deletion Creation ● Primary (Storage) Secondary (Backup) Archival or Deletion The primary differentiator from business to business is the speed at which data progresses through its lifecycle The Data Lifecycle Progression - II ● Due to the increased value of corporate data, technologies typically considered for secondary storage become a more important in the “active” data lifecycle discussion Creation ● Primary Storage Secondary Storage In addition to platform decisions, businesses must be prepared to address changes in data protection and recovery / retrieval to support end user needs Primary Storage Considerations What key capabilities or functions are needed? What are my performance expectations? What level of data protection is needed? What protocols do I need to support? Are multiple systems sharing the same primary storage? Does interoperability with existing technology present an issue? What role does Storage Virtualization play? Is the data value best served with Tiered storage? Should I be in the “Cloud”? Secondary Storage Considerations ● ● ● ● ● ● ● ● ● What key capabilities or functions are needed? Are our Recovery Objectives (RPO / RTO) clearly defined? What role does Storage Virtualization play? Is my infrastructure designed to support data replication? Is there value in considering Data Deduplication? What regulatory or compliance issues must be considered? Can this technology be eliminated altogether? What “pain” exists if there is an infrastructure failure? Are appropriate controls in place to prevent changes? Topics for Discussion ● ● ● ● ● ● ● ● ● ● ● ● ● The “Problem” Existing Technology Functional Capabilities / Shortcomings Reliability Infrastructure (SAN / iSCSI / NAS) Performance Upgrade Expense Maintenance Support Technical Support / Coverage Obsolesence Skills Etc… Etc… Cima’s On Time, On Target Approach Cima Solutions Group uses a proven, iterative approach to addressing our clients needs. Our three-phased process begins with an understanding our clients business issues through a detailed assessment, which clarifies the requirements, identifies possible solution alternatives, and formulates the total cost of ownership. Phase I - Assess & Discover ● Business ● Define the business problem Assess & Discover ● Understand the business requirements ● Assign a value to each requirement ● Identify the “Pain” ● What is lost if you do not accomplish this? Cima Process Solution ● Prioritize the requirements Options ● Technology ● Evaluate existing environment ● Identify strengths & weaknesses ● Analysis (Deliverable) ● Confirm weaknesses are not addressing the pain Phase II - Explore Options ● Data Value Analysis ● Evaluate data residency options and data prioritization (tiering) Assess & Discover ● Consider cost-effective data protection (CDP / Virtualization) ● Document how the requirements are addressed by the capabilities Cima Process Solution ● Options Options ● Compare options against documented requirements ● Refine the value proposition Comparing Alternatives ● We measure how potential solutions compare against one another, mapped to the defined requirements Usability Measurement Migration Ease Option 1 Option 2 Option 3 Option 4 Option 5 B A B A A A Option 1 B B Option 2 B A Option 3 A A Option 4 B Option 5 BA AA AA AB B A Option 1 AA BA Option 2 AA B Option 3 BA A Option A 4 Option 5 A AA AB B B B B A A CA A A A Flexibility C Functional Performance A Measurement Utilization RAID-6 B ScalabilityDe-Duplication C A Other Administration SE Flash CMeasurement AB Application Power Efficiency C Integration Integrated Solution Storage Virtualization C Growth Multi-Protocol Floorspace Price C C B A A A A C B A A A A A Phase III – Solution Recommendation ● Identification ● Select the solution which is supported by the process inputs Assess & Discover ● Deliver solution justification summary Cima Process Solution Options Justification ● We can offer justification assistance using a Total Cost of Ownership calculation for the proposed solution ABC Company Total Cost of Ownership Calculations Straight Line Depreciation Schedule 3 Year 1 Year 2 Year 3 Rationale Server Infrastructure General Server Refresh Avoidance (2,667) (4,000) (4,000) Data Server Growth Avoidance / 1 Per Year (3,333) (8,767) (14,410) File servers (3) may be re-deployed for other functions, so no need to buy additional servers Double-Take License Cost Avoidance - Above Servers (1,667) (3,821) (5,976) 244License cost + maint per license estimated at $244 per (2010) Check Imaging Replacement Storage Server + DR (3,333) (8,767) (14,410) 22TB usable disk storage (JBOD) + maintenance (2 Servers) Check imaging Solution Maintenance Avoidance (2,400) (2,520) (2,646) (9,000) (9,900) (10,890) 2Servers dedicated for storage applications + maintenance Data Growth Actual storage Estimated annual maintenance for 4sight solution Management Storage Server Support Cost Avoidance (75)Hourly Rate 120# of Hours Replication Double-Take License Growth Cost Avoidance (3,333) (4,309) (6,261) Licenses for 2 servers per site per year + maintenance 0 (8,216) (8,627) Maintenance termintation for existing licenses Media Cost Reductions (9,422) (9,422) (9,422) Assumes 75% Reduction Symantec Agent License Maintenance Termination (1,500) (1,500) (1,500) Assumes 75% Reduction (36,656) (61,223) Double-Take License Termination Backup / Backup Media One Safe Place Annual Subtotal Savings Total Cost Savings (78,143) (176,021) Next Steps & Call to Action ● Self assess your stage in the analysis process ● Choose how to use Cima Solutions Group ● Oversight to Your Process ● Requirements Definition ● Identify Alternatives ● Process Validation ● Review strategies for Solution Justification Thank You Kenneth B. Scott Director – Storage Sales (972) 499-8266 [email protected] Comparison Phase Backup Slides Disk Tiering Approaches - 1 Traditional disk tiering is often implemented using a physical segregation of disks within a common infrastructure, or with multiple subsystems under application control Issues: Inefficiencies exist in the migration of data between tiers / often manual initiation Migration of data is typically “one way” Migration of data consumes valuable processing resources All tiers compete for same processing and perform resources Lower cost disk price advantage is mitigated by infrastructure Return Disk Tiering Approaches - 2 Virtualized disk tiering utilizes an external appliance to manage the copying or migrating of data between tiers – including between physical subsystems Benefits: Allows for storage pooling Introduces performance advantages by aggregating resources Allows for thin provisioning Allows for re-use of existing infrastructures Supports online data migration Supports Information Lifecycle Management Streamlines software licensing Simplifies asset recovery Return Disk Tiering Approaches - 3 Tierless storage subsystems exploit parallelism of commodity disks to provide higher performance and availability with lower cost technology Benefits: Allows users to simply “set it and forget it” Removes the need for tiering through parallelization of low cost technology Simplifies data management Lowers the Total Cost of Ownership for disk storage Introduces linear scaling of performance Incorporates thin provisioning by design Return Disk Tiering Approaches - 4 Flexible Tiering supports an automated, two way migration of data across disk tiers, controlled by application IO patterns Benefits: Allows users to simply “set it and forget it” Removes the complexities associated with multiple disk tiers by automating data movement Simplifies data management Data is managed at a more granular level Lowers the Total Cost of Ownership for disk storage Incorporates thin provisioning by design Minimizes the footprint by leveraging more high capacity drives Return What’s to Come… DS8000 RAID Application Aware FlashCopy SVC-Like Virtualization Coming October 7, 2010 Fibre & iSCSI XIV GUI Easy-Tier What’s to Come… Tape Fallacies Exposed - The Future of Tape is Bright by David Hill, The Mesabi Group