Big Bad, Deep Dark Data - Part One
For a while now, the ‘techno-sphere’ has been buzzing about the impending Big Data tidal wave. Books and magazine covers are now frequently plastered with these ominous words.
They acknowledge that the explosion of smart devices has added plutonium to the fire, but they look to the core of storage infrastructure as the path to resolution. Their technological answers are compression, deduplication, and tiered storage management—curiously called active archive now. Yet for all of their bluster and alarm, these publications have little to say about the humble end user.
But I say, “It is the tiny krill that feeds the whale.”
Users will greedily consume any available space you offer them with their unstructured, unnecessary, and duplicated business-personal data sets. This data comprises all the items employees handle as a natural course of their jobs—but in their own special human way, which isn’t necessarily the most business efficient way. These poor data handling practices by users can contribute to security risks, intellectual property risks, as well as legal and regulatory risks. This has long been understood as a security and network management issue, but with the BYOD revolution, the problem has really gone Big. Data, that is.