Aggressively Priced Clouds

Aggressively Priced Clouds

One of the key reasons for moving to a cloud-based infrastructure is to lower overall infrastructure costs. This is true whether you are building an in-house—private—cloud or are a public cloud provider looking to price your offerings competitively. Because storage comprises such a large part of the outlay of any cloud-based infrastructure, it is an obvious place to look for optimizations that can lower overall costs.

A lower-cost virtual infrastructure gives cloud providers pricing leeway that can be used either to beat a competitor’s price or to increase margins. New storage technologies introduced within the last five years provide significant opportunities to lower storage costs while still creating the type of high performance, scalable and highly available infrastructures that cloud providers need to meet their customers’ business requirements.

Candidate Storage Technologies

The critical technologies in building a cost-effective storage infrastructure include the following:

Scalable, resilient networked storage subsystems. Ensure that the storage you choose is modularly expandable and will scale to meet your business requirements. Networked storage architectures offer better opportunities not only for expansion, but also for redundancy and for storage sharing, which is critical to support the live migration of virtual machines (VMs) necessary to meet uptime requirements. Storage layouts should use RAID for redundancy and provide multiple paths to each storage device for high availability, as well as supporting online expansion and maintenance.

Thin provisioning. Historically, storage has been significantly over-provisioned to accommodate growth. Allocated but unused storage is an expensive waste of space, and thin provisioning is a storage technology that effectively addresses this. By transparently allocating storage on demand as environments grow, administrators no longer have to over-provision.

When thin provisioning technology is initially deployed in an environment, it’s not uncommon for it to decrease storage capacity consumption by 70 percent or more. It allows higher use of existing storage assets, reducing not only hardware infrastructure costs but also energy and floor space costs.

Scalable snapshot technologies. Snapshots have all sorts of uses—working from VM templates, ensuring a safety net during software updates, creating copies for test/dev environments or cloning desktops in VDI environments—all of which have significant operational value. If you’ve worked with snapshots in the past, you probably already know that snapshots can impose negative performance impacts.

In fact, this performance impact can be so bad that administrators consciously limit their use of snapshots in some situations. In others, the value snapshots can provide has helped drive the purchase of high-end, expensive storage arrays that overcome snapshot performance issues. In virtual computing environments, hypervisor-based snapshots generally impose these same types of performance penalties.

Snapshots also can be very valuable when used for disk-based backup. Your customers will expect you to protect their data and provide fast recovery with minimal data loss. To provide the best service to your customers, data protection operations should be as transparent as possible. The best way to meet these requirements will be to use snapshot backups, working with well-defined APIs such as Windows Volume Shadowcopy Services (VSS) to ensure that you can create application-consistent backups for fast, reliable recovery.

For cloud computing environments, the ability to use highperformance, scalable snapshot technology has real operational value. Each cloud provider will need to evaluate how best to meet this need while still staying within budgetary constraints.

Primary storage optimization. SCO technology is not limited to use with secondary storage, and a number of large storage vendors offer what is called “primary storage optimization” in their product portfolios today. Similar in concept to deduplication (but not in implementation), these products effectively reduce the amount of primary storage capacity required to store a given amount of information. Because of their high performance requirements, primary data stores posed an additional challenge that did not exist for secondary storage: whatever optimization work is done must not impact production performance.

Describing the different approaches for achieving primary storage optimization is beyond the scope of this article, but suffice it to say that they can generally reduce the amount of primary storage required for many environments by 70 percent or more, reducing not only primary storage costs but also secondary storage costs (since less primary storage is being backed up).

For Cloud Providers, Cost is Critical

When selling cloud-based services, the set of performance, scalability, and availability requirements are relatively clear, and building the storage infrastructure to meet those needs will likely comprise at least 40 percent of the overall cost of your virtual infrastructure. But there is a big difference in how each cloud provider chooses to get there, and how each leverages available storage technologies to meet those requirements.

The functionality of cloud service offerings for specific markets may be the same across providers that address those markets, but the one who meets those requirements with the most cost-effective virtual infrastructure has a significant leg up against the competition. The storage technologies available in today’s market offer the savvy cloud provider the tools to achieve this advantage.

This article originally appeared in the December 2011 issue of Security Today.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions. 3