Happy Earth Day 2016 Eliminating Digital and Data e-Waste

Happy Earth Day 2016 Eliminating Digital and Data e-Waste

server storage I/O trends

With Earth Day 2016 on April 22, here are some thoughts about electronic waste (e-waste).

For those involved in data management or data infrastructures, the following are five tips to help cut the overhead and resulting impact of digital e-waste and later physical e-waste. Most conversations involving e-waste focus on the physical aspects from disposing of electronics along with later impacts. While physical e-waste is an important topic, lets expand the conversation including other variations of e-waste including digital. By digital e-waste I’m referring to the use of physical items that end up contributing to traditional e-waste.

digital and data ewaste

Digital e-waste ranges from the overhead of keeping extra copies of data that result in an expanding data footprint that in turn requires extra physical resources and their impact. Addressing physical e-waste also means keeping digital (not the physical items) including data waste in perspective. Also note that digital or data waste may in fact not be waste per say if it exists as a by-product of making sure applications, data and resulting information are protected, preserved, secured and served for when needed. The warning is what can be done to make sure there are good useful effective and efficient copy data that has a relative low data footprint overhead impact, more on this later.

Here are six themes to consider to cut the impact without costing or compromising your organization when address e-waste (physical, digital, data).

1. Understand Digital e-waste

You might be familiar with the term e-waste (electronic waste), you know, those physical items that get discarded from supporting your digital lifestyle. The reason awareness around e-waste is important is because of the environmental impacts of discarding all those devices. The more known about the issue, impacts, causes and effects helps to drive awareness as well as insight into what can be done to mitigate those items.

ewaste

Devices range from smart and dumb cell phones, personal digital assistants (PDAs), tablets, notebook and workstation computers, MP3 devices, cameras, video display monitors along with larger servers, storage and networking technology, not to mention all the other Internet of Things (IoT) and Internet of Device (IoD) items. What’s important to know about physical e-waste is the impact of the various components. You can learn more about physical e-waste impact in general with a web search such as Google e-waste impact.

2. Reuse, Repurpose, Redeploy, Reconfigure, Re-Tool, Recycle

Reconfigure and retool where possible by re-driving installing newer, more energy-efficient high-capacity drives, or more performance effective devices. Besides replacing Hard Disk Drives (HDD), Solid State Devices (SSDs), magnetic tape among other mediums, look at the pro’s and con’s of replacing CPU processor sockets, upgrading memory and PCIe I/O cards for networking or storage among other enhancements. Pro’s include being able to use the chassis longer reducing amount of physical e-waste, however at some point it can be more cost-effective to do a total replacement. However the longer you can use the asset or device the more that has as a positive benefit to cut e-waste.

Repurpose, reuse and redeploy assets such as servers, storage and networking devices in a hand me down approach assuming there is a value or benefit in doing so.

Recycle when done, dispose of the technology properly including for storage secure erase of digital media and later physical handling.

3. Responsible Recycle and Disposition of technology (including secure digital destruction)

What are you doing with, how are you disposing of physical items ranging from laptops, workstations, tablets, phones, MP3 players, TVs and monitors, servers, network and storage devices among others when no longer needed? Are you securely erasing your digital data on HDDs as well as SSDs or even tape and optical devices before they are disposed of? If not, you should be. For example if you are not yet using or looking at Self Encrypting Drives (SED) including HDDs and SSDs for securing your data, start investigating them. Sure they have a security value proposition for when lost or stolen, however they can also cut the time to secure erase to a given standard from days or hours to minutes or seconds.

These will become e-waste

Smart shopping up front, what you want, what you need, how long can you leverage, spend more up front to get something that can last 3-5 years vs. discarding in 1.5-3 years.
Smart management with insight, know your cost and impacts, not just for PR purpose, for profit and practicality

4. Plan acquisitions with disposition in mind

Redesign and design for replacement, maximizing what you have or will acquire, using it for longer time to cut costs, improve productivity (and profitability) while reducing e-waste overhead contributing footprint.

For example, do you need or want to have the latest in new technology replacing that phone, tablet, watch or other IoT or IoD item as soon as something newer comes along? No worries if you are also doing something responsible with what was new and now old by such as donating or giving it to somebody else who might be able to get a few more years worth of use out of it before it becomes e-waste.

On the other hand, if you are acquiring technology with a 2-3 year useful life plan, what would it take to upgrade that item to a larger or more robust version using it for 3-5 years. Granted, you might not use it in its primary role for the longer duration, however can it be repurposed for some other uses? Also from a technology acquisition perspective, have a forecast and plan that can help you make smart, informed decisions up front knowing when upgrades or extra resources will be needed to prolong the usefulness of the item.

Of course you can also simply move everything to the cloud and out-source your e-waste footprint to the MSP or cloud provider.

5. Understand Changing Data Value

Keep in mind that data has either no value, some value or unknown value all of which can change over time. For example some data has value for seconds, minutes or hours and can then be discarded. Other data have some value which can be low or high which determines how as well as when, where and how to protect, preserve, secure and serve it when needed. Then there is data that has an unknown value. However, that can change over time.

Different and Changing Data Value

Over time your data may end up having no value meaning it can be discarded, or, it might have some value (low or high) meaning change how it should be protected, preserved, secured and served. Then there is data that may stay in limbo or unknown status indefinitely or until somebody, or some software or via other means decide if it has value or not.

The point is that to cut digital e-waste is to discard data with no value as soon as possible, protect, preserve, secure and serve data with value appropriately. Likewise, for all of that growing data with an unknown value, rethink how it is protected and stored, all of which has an impact on both physical as well as digital e-waste.

This means having insight and awareness into your environment, applications, data, settings, configuration and metadata, not only of the space being used, or when it was last updated. Also, look beyond when data was last modified or changed, look at when it was last read or accessed to decide how protected and secured including virus and other scans.

6. Data Footprint Reduction (DFR)

Implement data footprint reduction (DFR) to lower overhead impact not only at the target or downstream destination using compression, dedupe and other techniques. Also, move upstream to the source where the problem starts and address it there. Addressing at the source leverages various techniques from Archiving, Backup/Data Protection Modernization (rethinking what saved, when, how often, etc), Cleanup, Compression and Consolidation, Data management, Deletion and Dedupe along with storage tiering, RAID/Parity/Mirroring/Replication/Erasure Code and Advanced Parity/LRC/Forward Error Correction and other technologies.

For example if you have 10TB of data, how many copies do you have and why, how are those copies protected and what is their overhead. The issue and concern should not be primarily how many copies, rather, if those copies add or give value, then what can you do to keep them while reducing their overhead impact, besides simply trying to compress or dedupe everything. Hint, start exploring copy management as well as revisiting what you protect, when, where, why, how often along with options for implementing DFR as close to the data source as possible, as well as downstream.

Where To Learn More

What This All Means

Gain insight and awareness into what is occurring with physical and digital ewaste side stepping the greenwashing and other activity. Small steps implemented by many will have a big impact. Every bit, byte, block, blob, bucket file or object along with their copies have an impact, hopefully as well as a benefit, a question is how can you reduce the overhead while increasing your return on innovation reducing costs, complexity and overhead while enhancing organization capabilities. There are many techniques, technologies, tools and approaches to apply to various environments, after all, everything is not the same, yet there are similarities. Happy Earth Day 2016 and happy spring to those of you in the northern hemisphere (as well as elsewhere).

Ok, nuff said, for now

Cheers
Gs

Greg Schulz – Author Cloud and Virtual Data Storage Networking (CRC Press), The Green and Virtual Data Center (CRC Press) and Resilient Storage Networks (Elsevier)
twitter @storageio

All Comments, (C) and (TM) belong to their owners/posters, Other content (C) Copyright 2006-2023 Server StorageIO(R) and UnlimitedIO All Rights Reserved

Data Protection Diaries – My data protection needs and wants

Storage I/O trends

Blog post: Data Protection Diaries – My data protection needs and wants

Update 1/10/18

Rather than talking about what others should do or consider for their data protection needs, for this post I wrote down some notes using my Livescribe about what I need and want for my environment. As part of walking the talk in future posts I’m going to expand a bit more on what I’m doing as well as considering for enhancements to my environment for data protection which consists of cloud, virtual and physical.

Why and what am I Protecting?

live scribe example
Livescribe notes that I used for creating the following content

What is my environment

Server and StorageIO (aka StorageIO) is a small business that is focused in and around data infrastructures which includes data protection as a result, have lots of data including videos, audio, images, presentations, reports, research as well, file serving as back-office applications.  Then there are websites, blog, email and related applications, some of which are cloud based that are also part of my environment that have different availability, durable, and accessibility requirements.

My environment includes local on-site physical as well as virtual systems, mobile devices, as well as off-site resources including a dedicated private server (DPS) at a service provider. On one hand as a small business, I could easily move most if not everything into the cloud using an as a service model. However, I also have a lab and research environment for doing various things involving data infrastructure including data protection so why not leverage those for other things.

Why do I need to protect my information and data infrastructure?

  • Protect and preserve the business along with associated information as well as assets
  • Compliance (self and client based, PCI and other)
  • Security (logical and physical) and privacy to guard against theft, loss, instrusions
  • Logical (corruption, virus, accidental deletion) and physical damage to systems, devices, applications and data
  • Isolate and contain faults of hardware, software, networks, people actions from spreading to disasters
  • Guard against on-site or off-site incidents, acts of man or nature, head-line news and non head-line news
  • Address previous experience, incidents and situations, preventing future issues or problems
  • Support growth while enabling agility, flexibity
  • Walk the talk, research, learning increasing experience

My wants – What I would like to have

  • Somebody else pay for it all, or exist in world where there are no threat risks to information (yeh right ;) )
  • Cost effective and value (not necessarily the cheapest, I also want it to work)
  • High availability and durability to protect against different threat risks (including myself)
  • Automated, magically to take care of everything enabled by unicorns and pixie dust ;).

My requirements – What I need (vs. want):

  • Support mix of physical, virtual and cloud applications, systems and data
  • Different applications and data, local and some that are mobile
  • Various operating environments including Windows and Linux
  • NOT have to change my environment to meet limits of a particular solution or approach
  • Need a solution (s) that fit my needs and that can scale, evolve as well as enable change when my environment does
  • Also leverage what I have while supporting new things

Data protection topics, trends, technologies and related themes

Wrap and summary (for now)

Taking a step back to look at a high-level of what my data protection needs are involves looking at business requirements along with various threat risks, not to mention technical considerations. In a future post I will outline what I am doing as well as considering for enhancements or other changes along with different tools, technologies used in hybrid ways. Watch for more posts in this ongoing series of the data protection dairies via www.storageioblog.com/data-protection-diaries-main/.

Ok, nuff said (for now)

Cheers
Gs

Greg Schulz – Author Cloud and Virtual Data Storage Networking (CRC Press), The Green and Virtual Data Center (CRC Press) and Resilient Storage Networks (Elsevier)
twitter @storageio

All Comments, (C) and (TM) belong to their owners/posters, Other content (C) Copyright 2006-2024 Server StorageIO and UnlimitedIO LLC All Rights Reserved

Wide World of Archiving – Life Beyond Compliance

Earlier this week I did a keynote talk at a TechTarget event in the New York city area titled the “Wide World of Archiving – Life Beyond Compliance” with the basic theme that archiving and data preservation for future or possible future use is not unique or exclusive to SARBOX, HIPPA, CFR, PCI, OHSAS, ISO or other members of the common alphabet soup of governmental or industry regulatory compliance needs.

The basic theme is that archiving can be used to discuss many IT and business pain points and issues from preserving project oriented or seasonal data to off-loading un-used or seldom used data to free up resources to meet power, cooling, floor space and environmental (PCFE) issues
“aka Green”
along with boosting performance for on-line access as well as backup, BC and DR.

The challenge however is that archiving while a powerful technique, is also complex in that it requires hardware and mediums to park your data onto, software to find and then execute policies defined by someone to move data to the archive medium and if applicable, delete or cleanup data that has been moved all of which has cost and application specific issues. Then the human side which is more involved than simply throwing head count at the tasks and avoiding the mistakes of the Mythical Man Month.

The human side of archiving is the glue to make it work in that similar to cleaning out your garage, attic, basement or store-room, you can have someone come and do the real work, however do they have the insight to know what to keep and what to discard? Sure that’s an overly simple example, and there are plenty of search and discovery software management tool vendors who will be more than happy to show you a demo of their wares that will discovery and classify and categorize and index what data you have as well as interface with policy managers, data movers and archiving devices.

However who is going to tell the management tools what policies are applicable and the different variances for your different business segments or activities? Consequently the key to making archiving work particularly on a broader basis is to get internal personal familiar with your business, IT personal, as well as external subject matter experts involved all of which leads to a challenge and dilemma of is it cheaper to just buy more energy-efficient, space-saving storage than to pay the fees to find, manage, move and archive data. Talking with one of the attendees who brought up some good points that this all makes sense however there is a scaling challenge and when dealing with 100’s of TBytes or PBytes, the complexity increases.

This is where the notion of scaling with stability comes into play in that many solutions exist to address different functionality for example archiving, de-duping, compression, server or storage virtualization, thin-provisioning among many others however how do they scale with stability. That is, how stable or reliable do the solutions remain when scaling from 10s to 100’s to 10,000’s or even 100,000’s users, email boxes, sessions, streams or from 10’s of TBytes to 10’s of PBytes? How does the performance hold up, how does the availability hold up, how does the management and on-going care and feeding change for the better or worse? Concerns around scaling is a common issue I hear from IT organizations pertaining to both hardware and software tools in that what works great during a WebEx demo or PowerPoint or pdf slide show may be different from real-world performance, management, reliability and complexity concerns. After all, have you ever seen a WebEx or live office or PowerPoint or PDF slide deck showing a hardware or software based solution that could not scale or provide transparent interoperability? That would be akin to finding a used car sales rep who gives you a tour of how a car was refurbished inside and out after it was declared totaled by the previous owners insurance company after the last great flood or hurricane.

Getting back to archiving, and not trying to conquer all of your data at one time, take a divide and conquer approach, go for some low hanging fruit where your chances of success go up that you can then build some momentum and perhaps a business case to do a larger project. Also, one solution particularly one archiving software solution may not be applicable to all of your needs in that you may need a tool specialized for email, one for databases and another general purpose tool. Likewise you may need to engage different subject matter experts to help you with policy definition and establishing rules to meet different requirements which is where business partners can come into play with either their in-house staff, partners, or associates that they work with for different issues and needs.

Look beyond the hardware and software, look at the people or human and knowledge side of archiving as well as look beyond archiving for compliance as there is a much bigger wide world of archiving and opportunity. If you remember the ABC sports TV show “Wide World of Sports” you may recall Jim McCay saying “Spanning the globe to bring you the constant variety of sports… the thrill of victory… and the agony of defeat… the human drama of athletic competition… This is “ABC’s Wide World of Sports!”.

From an archiving perspective, keep this in mind in that there is a wide world of opportunities for archiving, the thrill of victory are the benefits, the agony of defeat are the miss-steps, lack of scaling, out of control costs or complexity, the human drama is how to make or break a solution, this is the “Wide World of Archiving”…

Rest assured, some form of archiving structured database, semi-structured email with attachments and un-structured word, PowerPoint, PDF, MP3 and other data is in your future, it’s a matter of when. Archiving is just one of many tools available for effectively managing your data and addressing data footprint sprawl particular for data that you can not simply delete and ignore, if you need it to go forward, you need to keep it. Or, as a friend of mine says You can’t go forward unless you can go back. Likewise, you can’t manage what you don’t know about; you can’t move and delete what you can’t manage.

Look for solution providers who are not looking to simply get you to buy the latest and greatest archiving storage device, or, the slickest archiving management tool with a Uhi Gui that rivals those on an Wii or Xbox, or, that is looking to simply run up billable hours. That’s a balancing act requires investing time with different business solution providers to see where their core business is, how they can scale, where and how they make their money to help you decide where and how they are fit as opposed to simply adding complexity to your environment and existing issues.

Ok, nuff said.

Cheers gs

Greg Schulz – Author Cloud and Virtual Data Storage Networking (CRC Press), The Green and Virtual Data Center (CRC Press) and Resilient Storage Networks (Elsevier)
twitter @storageio

All Comments, (C) and (TM) belong to their owners/posters, Other content (C) Copyright 2006-2024 Server StorageIO and UnlimitedIO LLC All Rights Reserved