Big Bad, Deep Dark Data - Part One

Posted by Dustin Smith, Chief Technologist
April 24, 2013

For a while now, the ‘techno-sphere’ has been buzzing about the impending Big Data tidal wave. Books and magazine covers are now frequently plastered with these ominous words.

They acknowledge that the explosion of smart devices has added plutonium to the fire, but they look to the core of storage infrastructure as the path to resolution. Their technological answers are compression, deduplication, and tiered storage management—curiously called active archive now. Yet for all of their bluster and alarm, these publications have little to say about the humble end user.

But I say, “It is the tiny krill that feeds the whale.”


Users will greedily consume any available space you offer them with their unstructured, unnecessary, and duplicated business-personal data sets. This data comprises all the items employees handle as a natural course of their jobs—but in their own special human way, which isn’t necessarily the most business efficient way. These poor data handling practices by users can contribute to security risks, intellectual property risks, as well as legal and regulatory risks. This has long been understood as a security and network management issue, but with the BYOD revolution, the problem has really gone Big. Data, that is.

About Dustin Smith Throughout his twenty-year career, Dustin Smith has specialized in designing enterprise architectural solutions. As the Chief Technologist, Dustin is responsible for the strategic direction of aligning the company’s growing consulting services with the client challenges he finds in the field, and he works closely with his regional architects to design new programs to address these issues.

Filed Under: Data & Storage

0 Responses to 'Big Bad, Deep Dark Data - Part One'

Leave a Comment

Please copy "evAhEhSCgwY0SznNwiyUwHkngmWjuIo6" into the field labeled "Uncaptcha"