Feeds

How to design a storage array: NOT LIKE THAT, buddy

Architecture might all look samey, but it's like that for a reason

3 Big data security analytics techniques

Storagebod We’ve had a few announcements from vendors recently and I've seen all manner of storage roadmaps. If I had one comment to make on all of these, it would be to say that if I were to design an array or a storage product, I probably wouldn’t start from where most of these guys are starting.

There appears to be a real fixation on the past, with lots of architectures which are simply re-inventing what has gone before. And although I understand why, I don’t understand why. Stick with me here.

Let’s take the legacy vendors. You can’t change things because you will break everything: you will break the existing customer scripts and legacy automation, you will break processes and understanding. So essentially, the vendor can’t build a new architecture because it breaks everything.

I get the argument, but I don’t necessarily agree with the result.

And then we have the new kids on the block, which want to continue building yesterday’s architecture today. “We’ll build something based on a dual-head filer,” they say, “because everyone knows how to do that and they understand the architecture.”

Yet again: I get the argument but I really don’t agree with the result.

I’m going to take the new vendors' situation first. If I wished to buy a dual-head filer, I’d probably buy it from one of the leaders of the pack. Certainly if I were a big storage customer, it would be very hard for one of the new vendors get it down to a price that is attractive.

Now, you may argue that your new kit is so much better than the legacy vendors that it is worth the extra hassle, but you will almost certainly break my automation and existing processes. Is it really worth that level of disruption?

The first situation with the legacy vendors is more interesting. Can I take the new product and make it feel like the old stuff from a management point of view? If storage is truly software (and the management layer is certainly software), I don’t see that it should be beyond the wit of developers to make your new architecture feel like the old stuff.

Okay, you might strip out some of the old legacy constructs. You might even fake them ... so if a script creates a LUN utilising a legacy construct, you just fake the responses.

There are some more interesting issues around performance and monitoring, but as a whole, the industry is so very poor at it. Breaking this is not such a major issue.

Capacity planning and management: well, how many people really do this? The really big customers likely do it, but they might well be the ones who will look at leveraging new technology without a translation layer.

So if I were a vendor, I would be looking at ways to make my storage “plug-compatible” with what has gone before – but under the covers, so to speak. I’d be looking for ways to do it a whole lot better and I wouldn’t be afraid to upset some of my legacy engineering teams. I’d build a platform on top of which I could stick "personalities".

And it’s not just about a common look and feel for the GUI, I'd engineer the same for the CLI and the APIs.

My advice to the new kids: make the change easy by reducing the friction. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.