Feeling like your brain is clouded? No, I don’t mean that your ability to think is disabled or that you’re having trouble finding clarity in your thoughts. I mean THE CLOUD- is it on your mind? Continue reading
New year data is starting to trickle in, and it looks like, despite rising revenue and no shortage of IT initiatives ahead, many of us may find ourselves in a “do more with less” situation this year.
Spiceworks, whose professional network serves more than six million IT professionals, recently released its 2015 IT Budget Report, with some interesting findings. Of the 600 IT pros who responded to this Voice of IT survey:
- More than 50% expect their revenue to increase in 2015.
- 33% expect to see an increase in their IT budgets in 2015, down from 42% last year.
- Just 25% expect their IT staff headcount to increase in 2015.
Storage Management Challenges
Virtualization has delivered on many promises: massive consolidation, huge cost savings, dynamic scheduling and live migrations of applications and storage. But, with all the simplifications from virtualization, comes the complications of end-to-end visibility and management of the storage infrastructure through the various layers of abstractions. And, according to leading industry analysts, the data managed by enterprises is expected to grow to over 40ZB by 2020. This rapid data growth combined with increased service level expectations introduces new management challenges or the equivalent of wearing data center “beer googles” to see the real cost of your storage.
In this third of a 3-part blog series, let’s take a look at how EMC ViPR SRM provides a comprehensive monitoring and reporting solution to help you visualize storage relationships, analyze configurations and capacity growth, and optimize today’s storage resources while providing a management framework that supports investments in software-defined storage.
End-to-End Data Path Visibility
ViPR SRM was built to manage the complexity of growing, heavily virtualized storage environments. With ViPR SRM, you obtain detailed relationship and topology views from the application, to the virtual or physical host, down to the LUN to identify service dependencies, even for EMC VPLEX and the storage arrays managed by VPLEX clusters. By leveraging the capabilities of ViPR SRM, you will gain new insights into their environment and understand the impact of storage utilization from the applications. With increased visibility, you will be able to optimize their storage utilization and understand where and how their capacity is consumed and when more will be needed. Configuration validation will improve service levels by avoiding outages due to setup errors.
Check out the new ViPR SRM whiteboard video for more information.
Capacity and Performance Reporting and Trend Analysis
ViPR SRM can help users make the most efficient, cost-effective use of Flash-based storage, such as XtremIO or VMAX3. Performance trends and performance alerts (greatly enhanced in ViPR SRM 3.6) can help identify, remediate, and even head-off performance problems, by assisting the user in making data placement decisions that take advantage of Flash.
ViPR SRM can result in up to a 99% reduction in generating reporting costs. When troubleshooting an issue it takes 88% less time to discover problems with ViPR SRM. Testing showed the manual process required 4 minutes and 28 seconds to log into all the elements, give a cursory review of each, and export the data for review. With ViPR SRM, it took only 31 seconds to view and export the same data.
Read about these cost savings and more in the new test report from Principled Technologies.
Automating Chargeback and Show Back Reporting
Additionally, ViPR SRM automates service-level discovery and provides chargeback reports, in order to align the cost of service delivery with business requirements. And new support in ViPR SRM 3.6 extends automated service-level discovery and chargeback reporting to VMAX3 service-level objectives (SLOs).
Data Protection Integrations
ViPR SRM 3.6 has enhanced integration with EMC Data Protection Advisor. ViPR SRM 3.6 adds reporting on compliance with backup policies for EMC Avamar and Symantec NetBackup. ViPR SRM backup reporting includes a summary of backup and restore success rates, and presents unified information about the associated backup environment, which enables users to remain aware of current and potential issues. It also displays the number of files that have been backed up and restored, including views by server and policy over time.
The EMC RecoverPoint Solution Pack for ViPR SRM reports on lag time, WAN/LAN bandwidth, storage capacity consumption trends, system health and consistency groups. These detailed reports for VPLEX, RecoverPoint, Avamar and Data Protection Advisor provide you with greater insights for better, faster decision making.
A Network Attached Storage (NAS) server is a storage system connected to a network providing access to a variety of clients, and optimized for file-level access. It doesn’t seem that long ago when NAS systems were just a few Terabytes, and a traditional full backup could complete in a weekend. Well those days are long gone, as data growth continues exponentially and we now move into the Petabyte range. I could write an entire blog on why this continues to happen, but let’s just say that larger NAS systems with higher performance continue to be more affordable, and it just seems so easy to keep all that data … forever and ever. Only when budgets, floor space, power and cooling, and recovery issues are brought into question, does the IT team take an in-depth look at solving the challenges, especially related to meeting backup and recovery SLAs and archiving. Continue reading
Data Protection Provisioning 2.0
Third platform applications are changing the way organizations manage, consume, deliver and protect storage. They are increasingly cloud-enabled, use sophisticated development frameworks, and are instantly available from any device. However, many existing applications are still in traditional and dedicated storage silos with restricted protection policies and provisioning has one basic purpose – connect well-known users to on-premise enterprise applications. Provisioning 1.0 operates with only an IT focus, with no business context and is in the dark ages. Provisioning 2.0 has emerged as a modern and agile way to fill the provisioning gap and is guided by a few key characteristics: business-driven, simple user experience, intuitive process, easy to deploy and maintain, and meets cloud and mobile demands. Continue reading
The impact that exponential data growth is having on the eDiscovery process has been dramatic in recent years. This increase in data has cancelled out the amount of time and money companies once could save by utilizing just standard archiving technologies. This calls for an archiving technology that can provide a scalable and sustainable solution with optimized searchability. Continue reading
In my last post of 2014, I shared some findings from the EMC Global Data Protection Index survey, including some new stats on data protection maturity.
I also included a link to the full report, which provides more detailed information about data protection practices on a global level as well as on a country-by-country basis. Very interesting stuff even to the non-data-protection-minded reader.
Not surprisingly, organizations worldwide aren’t as mature, or ahead of the curve, as one might expect given the world in which we live. It always amazes me how forward-minded we can be in some areas (think self-driving automobiles) and not so much in others (think data protection). Perhaps it’s just a “cool factor”? Continue reading
Are You on Solid Ground?
According to a recent survey by Vanson Bourne to over 3300 IT decision makers globally, 87% of businesses are behind the curve for data protection maturity and 71% of businesses are not fully confident of restoring their data and applications. Collectively, these enterprises are losing $1.7 trillion through data loss and unplanned downtime. The more data protection vendors they throw at their problems, the more data loss they experienced and the cost of downtime exploded to 5X the level of using just one vendor. Sounds like the ground is swampy to me. Continue reading
It’s human nature to look at the New Year as a new opportunity.
It’s a new start. A time to look at what we accomplished last year and what we aspire to accomplish this year. Resolutions often fall into categories to improve our well being – to lose that 10 pounds, exercise more, drink less…
But do you create resolutions that focus on the health of your business? Continue reading
Not surprisingly, in 2014 we had many discussions with our customers about Information Governance issues such as data retention and remediation, privacy and eDiscovery. Very surprisingly, at many of these meetings, we introduced the IT and Legal departments to one another for the first time. Continue reading
As I prepared to write this post, my last one for 2014, I reflected on the collection of posts (see complete list at end) I put together this year and wondered: How are you doing?
Did you make a resolution to find your center of gravity? And, if so, were you successful in keeping it? Has your strategy shifted downstream to customers? Or, like many of your peers or competitors, are you still laboring upstream with product-focused business plans and technology-led IT strategies?
If the findings from the recent EMC Global Data Protection Index survey are any indication – and I think they are – you’re probably heading in the right direction but have a lot of work still to do. As a barometer of sorts, 87% of the companies surveyed for the Index were behind the curve in terms of data protection maturity. Only 2.4% were considered “leaders” and just 11.3% “adopters.”
If you haven’t taken a look at the full survey results, I encourage you to do so. As the center of business activity moves downstream, capturing, analyzing and protecting customer data becomes critical, as does moving along the maturity curve. Evolution is essential.
While many of my colleagues on The Protection Continuum spent the year sharing detailed information about the important technology advances shaping the future of data protection, my focus was on the bigger business picture.
My collection of posts took a look at where we’re going, how we’ll get there and why it’s important for your business, and IT organizations, to tilt.
Here’s a recap. Enjoy – and happy holidays!
At the New Year, some people struggle to identify a bad habit that they want to end. Their co-workers, of course, instantly produce a long list of irritating behaviors. Similarly, every IT team’s business partners have a 2015 New Year’s Resolution for them – “Stop Being Dr. No.”
Lines of business complain that when they ask their IT for anything new, the answer is always “No.” Sometimes the rejection is instantaneous, with laments about reduced budgets, complex regulations, and distributed operations. Other times the refusal takes the form of “we’ll look at it,” and nothing ever happens. Lines of business don’t aspire to set up rogue IT environments; they feel like they have no alternatives. Continue reading
According to the EMC Global Data Protection Index, which surveyed 3,300 IT decision makers from mid-size to enterprise-class businesses across 24 countries, common data protection practices have left global businesses exposed to data loss and downtime to the tune of $1.7 trillion annually. For the sake of comparison, that’s about the same as the world’s total military spend in a single year. A startling statistic by any account! And this is only a glimpse of what’s to come if attitudes and practices toward data protection are left unchanged. Continue reading
Does your organization keep old, stale and useless data? Most do. In our practice we find that about two-thirds of data on file shares has not been accessed in at least six months. While the lack of access does not necessarily identify data that has no business value, it’s a pretty good indicator. Continue reading
I feel like I was born with a computer in my hand; I embrace them both from a business and personal perspective.
But I am a Gen-Xer, so certain realities are true. I was not born with a computer in my hand, but rather a typewriter, record player, and an Atari game console. According to the folks who define the characteristics of each generation, I have different priorities, perspectives, and drivers than Millennials (a.k.a. Gen-Yers). But how different? Continue reading
It’s been 13 years since the world changed.
While there have been no shortage of tragedies since 9/11, including other acts of terrorism home and abroad, war, hurricanes, tsunamis, and massive tornados, no single event has matched the impact of that day thirteen years ago. The transformation of the world after that event has touched all our lives in ways big and small, the technology industry included.
No, people really don’t care more about data protection now than they did then. Nor did the event set disk-based backup or VPLEX in motion. But 9/11 did help redefine the role and expectation of data protection. That day began the journey to converge data protection and security. Continue reading