Feeds

Aah, that warm sharing feeling. Just don't let the cloud rain on your firm

How to get biz-level file sharing right the first time, every time

Boost IT visibility and business value

Data is the lifeblood of every business. Without it we would know nothing of our products, our customers, our processes, our policies, our staff or our financial state.

Data is everything. Well, almost everything. Storing it is one thing, but it is irrelevant if the right people can't access it in the right way at the right time.

Role play

All but the tiniest businesses use shared filestore areas on servers that can be accessed across the company network. Access control is based on group and personal permissions to each folder, and the security layer is provided by the directory service of your server operating system – primarily, but not always, Microsoft Active Directory.

Role-based security, which dictates who has access to what based not on who they are but on what they do day to day, is a popular choice.

The concept is pretty simple, except when you try to define and enforce who owns which areas of data. At this point the will to live starts to ebb and you decide you'd rather herd cats or try to drink soup with a fork.

Eventually, though, you arrive at some kind of agreement, and so long as access control is done sensibly you are able to work usefully with your data.

Long distance

When your business spreads beyond a single location, you have to know how to make data accessible in more than one place.

Of course much of your London data will be accessed only by the London office and most of your Paris data will never travel outside Paris. Unless you have two entirely unrelated offices, though, you will have some kind of need for data sharing, even if it is just for common functions such as HR and financial reporting.

As long as there is some way to connect the offices together – whether it is a high-speed fixed link or a simple virtual private network (VPN) service using inexpensive internet connections – you can either configure “trusts” between the directory services at each location or alternatively have them as components of an over-arching umbrella directory service.

The concept of role-based permissions works superbly in this type of context because each location needs to know nothing about the people in the other; they simply define which roles have access to which data and let their distant colleagues assign roles to user IDs.

Global connections

If you have a London fileserver and a Paris fileserver, and a user in London wants to access a Paris file, it is easy enough for that user to navigate to the Paris server and find the file in question.

Imagine, though, that you have a couple of dozen offices around the world and you want to pull a file from Bob Smith's public folder. You know that Bob is in one of the US offices, but you can't remember which.

Wouldn't it be great simply to be able to navigate to a directory called \\mycompany\users\bob.smith without having to know where those files actually reside?

Distributed fileserver protocols such as Microsoft's DFS do precisely this. As well as including replication services (more about that later), they allow you to abstract a set of specifically named distributed filestores under a generic non-geographic structure and relieve the need for users to know anything about the underlying structure.

They are also clever enough to figure out where a user is located relative to the servers in the network (primarily by observing the time taken to move traffic between the client and the various servers) and maximise performance by doing cunning things such as authenticating users against their closest directory server.

Boost IT visibility and business value

More from The Register

next story
Pay to play: The hidden cost of software defined everything
Enter credit card details if you want that system you bought to actually be useful
HP busts out new ProLiant Gen9 servers
Think those are cool? Wait till you get a load of our racks
Shoot-em-up: Sony Online Entertainment hit by 'large scale DDoS attack'
Games disrupted as firm struggles to control network
Community chest: Storage firms need to pay open-source debts
Samba implementation? Time to get some devs on the job
Like condoms, data now comes in big and HUGE sizes
Linux Foundation lights a fire under storage devs with new conference
Silicon Valley jolted by magnitude 6.1 quake – its biggest in 25 years
Did the earth move for you at VMworld – oh, OK. It just did. A lot
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.