Storage Optimization “ RightStor ” Your Data
description
Transcript of Storage Optimization “ RightStor ” Your Data
Storage Optimization “RightStor” Your Data
Agenda
● Objectives
● Cima’s Point of View
● The Data Growth Problem
● Data Lifecycle Progression
● Primary Data Storage Considerations
● Secondary Data Storage Considerations
● Topics for Discussion
● The Cima Approach
● Next Steps & Call to Action
Objectives
● Educate our audience on the latest trends in data storage and data protection to encourage strategic decision making
● Serve as a means to stimulate thought and explore alternatives for selection of storage to process and protect valuable business data
● Convey the Cima Solutions Group approach to addressing our clients’ needs for reliable and efficient IT storage solutions which create financial value
Cima’s Point of View
● Cima has seen evidence that businesses are making storage decisions using traditional approaches, without awareness of options that exist in the marketplace, and how those options have created opportunities for dramatic cost savings and increased levels of resiliency
● The rate of storage consumption is outpacing the reductions in cost, and therefore businesses will continue to spend more on storage if they employ their existing paradigms
…RightStor Your Data
RightStoring is the process of identifying the most efficient and cost effective location for storage and protection of corporate data
The Data Growth Problem
● “There are 100 million Microsoft Office documents created every day”
Forrester Research
● “Last year, 161 Exabytes of digital information were created, representing 3 million times the information in all the books ever written”
IDC
● “58% of new corporate data growth is unstructured data such as Microsoft Office documents, set to grow at an annual rate of 96%”
Taneja Group
The exponential growth in data mandates that companies explore efficiencies in data storage and data protection
The Data Lifecycle Progression - I
● All data progresses through a value continuum from creation to archival and deletion
● The primary differentiator from business to business is the speed at which data progresses through its lifecycle
Creation Primary Secondary Archival or (Storage) (Backup) Deletion
The Data Lifecycle Progression - II
● Due to the increased value of corporate data, technologies typically considered for secondary storage become a more important in the “active” data lifecycle discussion
● In addition to platform decisions, businesses must be prepared to address changes in data protection and recovery / retrieval to support end user needs
Creation Primary Secondary Storage Storage
Primary Storage Considerations
What key capabilities or functions are needed?
What are my performance expectations?
What level of data protection is needed?
What protocols do I need to support?
Are multiple systems sharing the same primary storage?
Does interoperability with existing technology present an issue?
What role does Storage Virtualization play?
Is the data value best served with Tiered storage?
Should I be in the “Cloud”?
Secondary Storage Considerations
● What key capabilities or functions are needed?
● Are our Recovery Objectives (RPO / RTO) clearly defined?
● What role does Storage Virtualization play?
● Is my infrastructure designed to support data replication?
● Is there value in considering Data Deduplication?
● What regulatory or compliance issues must be considered?
● Can this technology be eliminated altogether?
● What “pain” exists if there is an infrastructure failure?
● Are appropriate controls in place to prevent changes?
Topics for Discussion
● The “Problem”
● Existing Technology
● Functional Capabilities / Shortcomings
● Reliability
● Infrastructure (SAN / iSCSI / NAS)
● Performance
● Upgrade Expense
● Maintenance Support
● Technical Support / Coverage
● Obsolesence
● Skills
● Etc…
● Etc…
Cima’s On Time, On Target Approach
Cima Solutions Group uses a proven, iterative approach to addressing our clients needs. Our three-phased process begins with an understanding our clients business issues through a detailed assessment, which clarifies the requirements, identifies possible solution alternatives, and formulates the total cost of ownership.
Phase I - Assess & Discover
● Business
● Define the business problem
● Understand the business requirements
● Assign a value to each requirement
● Identify the “Pain”
● What is lost if you do not accomplish this?
● Prioritize the requirements
● Technology
● Evaluate existing environment
● Identify strengths & weaknesses
● Analysis (Deliverable)
● Confirm weaknesses are not addressing the pain
Cima Process
Solution Options
Assess & Discover
Phase II - Explore Options
Cima Process
Assess & Discover
Solution
● Data Value Analysis
● Evaluate data residency options and data prioritization (tiering)
● Consider cost-effective data protection (CDP / Virtualization)
● Document how the requirements are addressed by the capabilities
● Options
● Compare options against documented requirements
● Refine the value proposition
Options
Comparing Alternatives
UsabilityMeasurement Option 1 Option 2 Option 3 Option 4 Option 5
Migration Ease B A B A A
Flexibility C A B A A
Performance A B B A B
Utilization B B A A A
Scalability C A A B B
Administration C A A A B
● We measure how potential solutions compare against one another, mapped to the defined requirements
FunctionalMeasurement Option 1 Option 2 Option 3 Option 4 Option 5
RAID-6 A A A B B
De-Duplication A A
SE Flash B A A A AApplication Integration C A C A
Storage Virtualization C B B A A
Multi-Protocol A A
OtherMeasurement Option 1 Option 2 Option 3 Option 4 Option 5
Power Efficiency A A A B B
Integrated Solution A A
Growth B A A A A
Floorspace C A C A
Price C B B A A
Phase III – Solution Recommendation
Cima Process
Assess & Discover
● Identification
● Select the solution which is supported by the process inputs
● Deliver solution justification summary
OptionsSolution
Justification
● We can offer justification assistance using a Total Cost of Ownership calculation for the proposed solution
ABC Company
Total Cost of Ownership Calculations
Straight Line Depreciation Schedule 3
Year 1 Year 2 Year 3 Rationale
Server Infrastructure
General Server Refresh Avoidance (2,667) (4,000) (4,000) File servers (3) may be re-deployed for other functions, so no need to buy additional servers
Data Server Growth Avoidance / 1 Per Year (3,333) (8,767) (14,410) 2Servers dedicated for storage applications + maintenance
Data Growth
Actual storage
Double-Take License Cost Avoidance - Above Servers (1,667) (3,821) (5,976) 244License cost + maint per license estimated at $244 per (2010)
Check Imaging Replacement Storage Server + DR (3,333) (8,767) (14,410) 22TB usable disk storage (JBOD) + maintenance (2 Servers)
Check imaging Solution Maintenance Avoidance (2,400) (2,520) (2,646) Estimated annual maintenance for 4sight solution
Management
Storage Server Support Cost Avoidance (9,000) (9,900) (10,890) (75)Hourly Rate
120# of Hours
Replication
Double-Take License Growth Cost Avoidance (3,333) (4,309) (6,261) Licenses for 2 servers per site per year + maintenance
Double-Take License Termination 0 (8,216) (8,627) Maintenance termintation for existing licenses
Backup / Backup Media
Media Cost Reductions (9,422) (9,422) (9,422) Assumes 75% Reduction
Symantec Agent License Maintenance Termination (1,500) (1,500) (1,500) Assumes 75% Reduction
One Safe Place
Annual Subtotal Savings (36,656) (61,223) (78,143)
Total Cost Savings (176,021)
Next Steps & Call to Action
● Self assess your stage in the analysis process
● Choose how to use Cima Solutions Group
● Oversight to Your Process
● Requirements Definition
● Identify Alternatives
● Process Validation
● Review strategies for Solution Justification
Comparison Phase
Backup Slides
Disk Tiering Approaches - 1
Traditional disk tiering is often implemented using a physical segregation of disks within a common infrastructure, or with multiple subsystems under application control
Issues: Inefficiencies exist in the migration of data between
tiers / often manual initiation
Migration of data is typically “one way”
Migration of data consumes valuable processing resources
All tiers compete for same processing and perform resources
Lower cost disk price advantage is mitigated by infrastructure
Return
Disk Tiering Approaches - 2
Virtualized disk tiering utilizes an external appliance to manage the copying or migrating of data between tiers – including between physical subsystems
Benefits: Allows for storage pooling
Introduces performance advantages by aggregating resources
Allows for thin provisioning
Allows for re-use of existing infrastructures
Supports online data migration
Supports Information Lifecycle Management
Streamlines software licensing
Simplifies asset recovery
Return
Disk Tiering Approaches - 3
Tierless storage subsystems exploit parallelism of commodity disks to provide higher performance and availability with lower cost technology
Benefits: Allows users to simply “set it and forget it”
Removes the need for tiering through parallelization of low cost technology
Simplifies data management
Lowers the Total Cost of Ownership for disk storage
Introduces linear scaling of performance
Incorporates thin provisioning by design
Return
Disk Tiering Approaches - 4
Flexible Tiering supports an automated, two way migration of data across disk tiers, controlled by application IO patterns
Benefits: Allows users to simply “set it and forget it”
Removes the complexities associated with multiple disk tiers by automating data movement
Simplifies data management
Data is managed at a more granular level
Lowers the Total Cost of Ownership for disk storage
Incorporates thin provisioning by design
Minimizes the footprint by leveraging more high capacity drives
Return
What’s to Come…
DS8000RAID
SVC-LikeVirtualization
XIV GUI
Easy-Tier
Fibre & iSCSI
ApplicationAware
FlashCopy
Coming October 7, 2010
What’s to Come…
Tape Fallacies Exposed - The Future of Tape is Bright by David Hill, The Mesabi Group