In large technology departments, dysfunctional relationships breed like mushrooms in a dank basement. Your dev and ops teams are no longer on speaking terms, while your junior and senior developers can't seem to agree on anything. IT and legal are constantly at each other's throats. Storage wonks are ready to declare war on the database admins, while sys admins seem to be on everyone's bad side.
Why can't they all just get along? In many cases it's the tension between conflicting demands on the same systems -- say, DBAs who complain about network performance but refuse to streamline their storage needs or business users who want to roll out new apps quickly, blissfully unaware of the effect they could have on other critical systems.
Fortunately there are solutions. We asked our geek relationship adviser, Crabby van Buren, to help find the common ground between these five warring factions. His advice follows.
Dysfunctional IT relationship No. 1: Storage admins vs. DBAs
Dear Crabby: Our database administrators have an insatiable appetite for storage. They never delete anything, they won't let us archive data or store it off-site, and they're constantly complaining the network is too slow. Meanwhile, the cost of storing all this data is killing our budget and making us storage engineers extremely unpopular with the CFO. What can we do?
— Underfunded & overcapacity
We feel your pain. Even today's networked and cloud storage options can't always keep up with the data explosion. But to the folks who aren't responsible for providing storage, the supply seems almost infinite.
"To solve the problem, you need to look at the groups that are producing the data," says Jim Damoulakis, CTO of Glasshouse Technologies, an IT infrastructure services provider. "DBAs are some of the biggest examples. They are extremely risk averse, tend to save everything, and want to have total control over all of it. But having to save everything forever can bring your backup systems to a screeching halt. You need to incent them to be more efficient."
In other words, once a department has to foot the bill for its insatiable storage habit, it may begin to appreciate the wisdom of efficiency. The problem is that most people hate chargebacks with a passion, says Damoulakis. The alternative is to set up a system that reports which users are consuming what resources, so when the CFO comes around to beat on the storage people for spending too much money they can say, "Talk to these guys."
Interestingly, says Damoulakis, a lot of this is already happening because of the cloud. Departments that bypass IT to order services directly from a third-party cloud vendor are finding that they're charged on a consumption basis, whether they like it or not.
"In a funny way the cloud is moving this to the forefront," he says. "It's a backdoor into a chargeback mechanism. Organizations that are adopting private clouds are also finding they can use that to make DBAs and other groups accountable for their own IT spend."
The Internet of Things (IoT) is everywhere and its use is growing fast. IoT is used by local governments to build smart cities. It’s used to build smart businesses. And, consumers are benefitting as it’s built into smart homes and smart...
The number of security incidents involving mobile devices has increased over the past year, but companies are not protecting their mobile assets as well as they do other systems. One in three organizations admitted to suffering a compromise due to a...
Digitally transforming enterprises are now able to seamlessly integrate a myriad of service providers and business partners globally through diverse private interconnections. Equinix’s Global Interconnection Index volume 2 (GXI2)...
Digital transformation and cloud security have led to a dramatic shift in how enterprises manage their applications and infrastructure. These two trends have developed into business necessities and have also changed the relationship between the...
Slack has given large business customers control over the keys used to encrypt and decrypt data created in its team collaboration application. The enterprise key management (EKM) feature was initially unveiled at the company’s...
Rapid digitalisation has resulted in a surge in both the number of endpoints and the means by which cybercriminals can infiltrate enterprise networks. Around the globe, the total financial damage due to cybercrimes is predicted to reach $8 trillion...
Mobile employees, distributed enterprises, and the move to the cloud are all forces that are driving organisations to transform their networks. But what about the arrival of 5G? Are you prepared for how that will affect your network? The growth...
For all the criticism that Amazon Web Services has received for allegedly stripmining open source software for corporate gain, the company that should perhaps scream loudest is no defenseless startup. It’s Google. At a recent AWS Summit,...