Top Banner

of 25

Information Life Cycle Management

Apr 15, 2018

Download

Documents

Ranya Brkumar
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/6/2019 Information Life Cycle Management

    1/25

    Information Life Cycle Management

    Seminar Report On

    INFORMATION LIFE CYCLEMANAGEMENT

    Submitted by

    PREENA K P

    In partial fulfillment of requirements in Degree of

    Master of Technology (M-Tech)

    In

    Software Engineering

    DEPARTMENT OF COMPUTER SCIENCE

    COCHIN UNIVERSITY OF SCIENCE ANDTECHNOLOGY

    KOCHI-682022

    2008

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    2/25

    Information Life Cycle Management

    COCHIN UNIVERSITY OF SCIENCE ANDTECHNOLOGY

    DEPARTMENT OF COMPUTER SCIENCE

    COCHIN-682022

    Certificate

    This is to certify that the seminar report entitled

    INFORMATION LIFE CYCLE MANAGEMENT submitted by Preena

    K P , in partial fulfillment of the requirements of the award of M-Tech

    Degree in Software Engineering, Cochin University of Science and

    Technology, is a bonafide record of the seminar presented by her duringthe academic year 2008.

    Dr. Sumam Mary Idiculla Dr. Paulose Jacob

    Course Coordinator Head of the Department

    Place: Cochin

    Date: 20-10-08

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    3/25

    Information Life Cycle Management

    ACKNOWLEDGEMENT

    I thank GODalmighty for guiding me throughout the seminar. I would

    like to thank all those who have contributed to the completion of the seminar and

    helped me with valuable suggestionsfor improvement.

    I am extremely grateful to Prof. Dr. K Paulose Jacob, Director,

    Department of Computer Science, for providing me with best facilities and

    atmospherefor the creative work guidanceand encouragement.

    I would like to thank my coordinator, Dr. Sumam Mary Idicula for all help and

    support extend to me. I thank all staff members of my college and friends for

    extendingtheir cooperationduring my seminar.

    Above all I would like to thank my parents without whose blessings I would not

    have been able to accomplishmy goal.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    4/25

    Information Life Cycle Management

    Abstract

    A new framework, created to enhance information life cycle

    management by clarifying the relationship between value-at-risk and

    total cost of ownership, helps IT managers build a winning storage

    environment.

    Faced with higher storage costs and burgeoning data growth, the concept

    of information life cycle management (ILM) has emerged to help management

    understandtheir information needs and to structure their storage spending in awaythat meets those needs.

    Information Lifecycle Management (ILM) is designed to address these

    issues, with a combination of processes, policies, software and hardware so that

    the appropriate technologycan be used for each phase of the lifecycle of the data.

    The task of measuring the risk to information value and deciding how

    additional storagespendingmay be able to reduce that risk to more tolerable levels

    is not unlike the task facing fund managers within the financial services sector.

    Value-at-Risk, expressedin absolute or relative percentageterms, acts as a trigger

    for corrective action but it also showshow much a firm can spend to protect itself if

    VaR is exceeded. Total cost of ownership (TCO)is a standard metric for evaluating

    storage environments. The critical task is to determine how VaR responds to a

    changein TCO.

    A frameworkthat enhancesILM by clarifying the relationship betweenVaRand TCO, a relationship that is often in flux because of the dynamic nature of

    information value and firms growing desire to capture data on multiple aspects of

    their business. By considering this frameworkand VaR in particular, we argue that

    IT managerscan forge an effective and secure storageenvironment.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    5/25

  • 8/6/2019 Information Life Cycle Management

    6/25

    Information Life Cycle Management

    1. INTRODUCTION

    Although most organizations have long regarded their stores of data as

    one of their most valuable corporate assets, how this data was managed and

    maintained varies enormously. Originally, data was used to help achieve

    operational goals, run the business and help identify the future direction and

    successof the company.

    However, new government regulations and guidelines are a key driving

    force in how and why data is being retained, as they are now requiring

    organizations to retain and control information for very long periods of time. So

    today there is two additional objectives IT managers are trying to satisfy: to store

    vast quantities of data, for the lowest possible cost; and to meet the new regulatory

    requirementsfor data retention and protection.

    1.1 Regulatory Requirements

    Previously organizations retained data because they wanted to, today,

    many organizations have to retain specific data for specified periods of time.

    Failure to comply with these regulations could result in organizationshaving to pay

    very heavy fine. Therefore, around the world, a numberof regulatory requirements,

    in the US and the European Data Privacy Directive in the European Union are

    changing how organizations manage their data. These regulations specify what

    data must be retained, whether it can be changed, and for how long it must be

    retained, which could be for a period of 30 years or even longer. These regulations

    frequently demand that electronic data is secure from unauthorized access and

    changes, and there is an audit trail of all changesto data and by whom.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    7/25

    Information Life Cycle Management

    In the aftermath of the IT Doesnt Matter debate [3], a consensus has

    emergedthat if corporate IT assets such as hardware, soft-ware, and networksare

    susceptible to replication by competitors, a competitive advantage can only comefrom the information created by such assets [11]. Meanwhile, a precipitous decline

    in data storage costs of 45% per annum, on a cost-per-gigabyte basis [6], has

    satiated firms desire to capture information on multiple business transactions and

    relationships. Moreover, the much anticipated adoption of RFID and recent

    regulatory reforms such as SEC Rule 17a- 4, mandating the retention of

    electronic communicationsrecords (email, VoIP, and IM) in securities trading firms

    for up to three years, are likely to accelerate the pace of data accumulation even

    further. In information-rich sectors such as credit card lending, retail, and health

    care, data growth has already begun to outstrip the decline in hard-ware costs,

    prompting a net increase in storage spending [8]. With storage now consuming

    12%15%of IT budgets, CIOs fear that further increases could erode strategic IT

    spending[4].

    2. WHAT IS ILM?

    Information today comesin a wide variety of types, for exampleit could be

    an email message, a photograph or an order in an Online Transaction Processing

    System. Therefore, once you know the type of data and how it will be used, you

    alreadyhave an understandingof what its evolution and final destiny is likely to be.

    The challenge now before all organizations, is to understand how their

    data evolves, determine how it grows, monitor how its usage change over time,

    and decide how long it should survive. Whilst adhering to all the rules and

    regulationsthat now apply to that data.

    Faced with higher storage costs and burgeoning data growth, the concept

    of information life cycle management (ILM) has emerged to help management

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    8/25

    Information Life Cycle Management

    understandtheir information needs and to structure their storage spending in away

    that meets those needs

    Changesin the storage infrastructure at most companiesover the last five

    years are also driving interest in information life-cycle management (ILM). The

    transition from host-based to network-based storage (both fabric-attached and

    network-attached) and the development of new storage technologies (i.e., Serial

    ATA) have led IT managers to tier their storage environment to deliver the proper

    balance of performance, data accessibility, cost, and data reliability for different

    classesof data accordingto their value to the business.

    The growingimportanceof ILM comesfrom the realization that the value of

    data to a company changes over time and can vary between different users or

    departmentswithin an organization. If information about the changingvalue of data

    can be harnessed, then that information can be used to better manage data and

    storage resources. While placing data on the most appropriate storage resource

    over its life cycle makes a lot of sense, many challengesneed to be addressed to

    implementan ILM solution.

    A universal challenge that IT organizations face is understanding what

    data and storage resources they have in their environment. Although storage

    administrators often know how much total capacity has been allocated to

    applications and departments, they are less familiar with the different types of data

    created by each departmentand end user, the growth of these different data types,

    how much data is stale or most active, or how much capacity is available and used

    at each storage location. A tougher challenge is determining the value of different

    sets of data at any point in time. The same data set will changeits value over time

    and different departmentswill value the same set of data differently. Therefore, the

    value of data needs to be reassessed periodically and allowed to vary across an

    organization.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    9/25

    Information Life Cycle Management

    Once data has been identified and classified based on its relative value,

    the next challenge is matching data to the most appropriate storage resource.

    Placing data on the right storage device involves moving files from the originallocation where they were stored to a new storage location. End users and

    applications, however, need ready access to their data as it is moved from location

    to location over its life cycle. File movement, therefore, has to be done

    transparently to users and applications. Once files are moved, managing backup

    and recovery can also becomean issue. If administrators do not have an accurate

    record of where files have been moved, then they will not know what servers,

    volumes,and directories need to be includedin the organization's backupprocess.

    Information Lifecycle Management (ILM) is designed to address these

    issues, with a combination of processes, policies, software and hardware so that

    the appropriate technologycan be used for each phase of the lifecycle of the data.

    The underlying premise of ILM is that information follows a natural lifecycle from capture throughapplication and decline.

    At each point in its life cycle, the issue for ILM is to identify the value of its

    information and how best to protect that information from loss and corruption. In

    this way, storage is like an insurance policy whose cost mirrors the value of the

    underlying asset and the risk that value will decline due to adverseevents.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    10/25

    Information Life Cycle Management

    2.1 Stages of ILM

    Stage of ILM Information value

    StorageArchitecture

    Storage Concerns &Issues

    1. Capture LowNear-line

    storage

    Ownershipof data

    Creation policies

    2. Application High Primarystorage

    Available capacity

    Accessand performance

    Backupand recoverytimes

    Efficiencyand utilizationSecurity and access

    3. DeclineMediumto

    LowTape, optical

    Retention policies

    Security and access

    Unfortunately, the complex task of valuing information has forced firms toapply ILM using cost criteria alone. Thus, firms tend to spend more on fault-tolerant

    hardwareand backup monitoring for data in regular usetheperception being that

    frequent use implies higher value. Data that is no longer in use or that is perceived

    to have lower value is archived onto inexpensive media such as magnetic tape or

    are deleted outright. Intel, for example, uses a 35-day email retention policy for its

    employees; after this period, email messagesare automatically deleted regardless

    of their perceivedvalue to the end user or the firm as a whole.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    11/25

    Information Life Cycle Management

    3. CONSIDERATION OF RISK

    A problem with this cost-centric approach is its failure to consider risk. In

    the event of a systems or media failure, time to recovery and point of recovery (that is, the age of the last backup)may vary widely.

    For example, hot sites routinely provide synchronous mirroring of data in

    real time but this entails a much greater level of investment than RAID devices or

    periodic backing up to tape. Delayed recovery may not be an issue for low-value

    data such as pay-roll records or social calendars but for critical data such as stop

    loss orders in a brokerage firm, any delay could prove embarrassing and lead to

    severe financial penalties. From a legal viewpoint, there is also a possibility that

    courts will order that electronic records be provided to opposing counsel within a

    certain time frame; failure to comply with such orders can prove costly [12].

    If risk is overlooked, firms have no way of knowing if they are spendingtoo

    much or not enough on protecting their data. In an era of regulatory oversight and

    paranoia over data loss, firms are unlikely to be risk seekers. Storing high-valuedata on unreliable, albeit less expensive media constitutes a risk that even the

    most recklessfirms are unlikely to accept. For risk averse firms, a desire to have all

    data recoverable in real time is impractical and cost prohibitive, especially if the

    volumeof data is expectedto rise sharply.

    Risk neutrality represents a compromise where firms are neither exposed

    to inordinate levels of uninsured risk nor spending vast sums on storage solutions

    to eliminate risk entirely. Risk neutrality does not mean that firms are indifferent to

    risk; rather, they are cost-effectively insured against all knownrisks.

    In theory, risk neutrality assumesperfect knowledge of all adverse events

    that could put the value of information at risk. For example, firms must know the

    probability of calamitous events such as terrorist attacks or natural disasters and

    the probability that the storage systems and backup media will perform as

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    12/25

    Information Life Cycle Management

    expected. In practice, bounded rationality and less-than- perfect foresight means

    that all risks will never be fully quantifiable.

    The best that a firm can do is to review historical outage patterns and

    extrapolate to a level of storage spending that protects against as many future

    adverse events as possible. In reality, this task is rarely performed with any

    appreciable degree of accuracy and so, adapting from a similar problem facing

    fund managementfirms, we outline a frame-work that balancesthe risk associated

    with data loss or corruption against storage spending that is meant to prevent or

    contain such adverseevents.

    4. VALUE-AT-RISK

    The task of measuring the risk to information value and deciding how

    additional storagespendingmay be able to reduce that risk to more tolerable levels

    is not unlike the task facing fund managers within the financial services sector.

    Fund managers know that fund values will vary based on market conditions.Managers are willing to accept some losses but only within predefined limits. To

    help establish this limit, fund managers apply value-at-risk (VaR), a measure that

    summarizes the worst loss over a target horizon with a given level

    of confidence [9].

    For example, using historical data, managersmay determinethat with 99%

    confidence, the worst percentage loss a fund is likely to suffer is 5% or $5M on a

    $100Mfund. If, on any given day, the fund value falls by more than 5%, managers

    may opt to use a hedgingstrategy to guard against further losses. VaR, expressed

    in absolute or relative percentageterms, acts as a trigger for corrective action but it

    also shows how much a firm can spend to protect itself if VaR is exceeded. For

    example, if a 6% decline in the value of a fund creates a $1M loss above what is

    expected at a 99% VaR level, fund managers know they can spend up to $1M to

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    13/25

    Information Life Cycle Management

    neutralize this loss. In practice, it is impossible to insure against all adverse market

    events but setting a VaR level at 95% or above gives managers an opportunity to

    identify how the most severe market perturbationsmight damagetheir portfolio.

    To see how VaR can be adapted to a storage environment and used to

    understandthe risks facing a firm and the value of its information, consider Figure I

    showinga typical distribution of storage-related risks.

    4.1 Probability distribution of adverse storage events

    Figure I

    Recognizing that valuing adverse events is not an exact sciencefor

    instance, it can be difficult to accurately assess how much an hour of CRM

    downtime costs a firmit is nevertheless possible to create a probability

    distribution of storage-related events and their cost to the firm from backup and

    restore logs, help desk tickets, and end-user surveys. As seen on the left side of

    the diagram, most events are of minor significance and have no lasting effects on

    the firm; accidental deletions and restoring earlier versions of files are typical

    examples.

    Meanwhile, other events can disrupt businessactivities leading to losses in

    the form of missedsales, court-imposedfines, or expedited data recoveryfees. For

    example, in 2005, Morgan Stanleys failure to report email messagesas part of an

    investor lawsuit led to a jury award of $1.45 billion (this was reversed on appeal in

    early 2007) [12]. Lastly, a handful of events can be catastrophic if they directly

    threaten the survival of the firm.

    Events such as the terrorist attacks of September 11, 2001 or natural

    disasters have been known to destroy data centers (as happenedin New Orleans

    following Hurricane Katrina) meaning that firms may have to bear significant

    Department of Computer Science

    Frequency

    Extent ofLossLow Medium High

    VaR(95% confidence Level)

    BusinessConsequences

    MinorInconvenience

    BusinessDisruption

    CatastrophicRepercussions

  • 8/6/2019 Information Life Cycle Management

    14/25

    Information Life Cycle Management

    additional cost in re-creating files from transaction-level data. Using this

    distribution, firms can compute VaR at, for example, the 95% confidencelevel. For

    the time period coveredby this data, each firm must then decide whether their levelof storage investment is reasonable, given the worst-case scenario that VaR

    represents. A firm that previously tried to reduce its storage spending by migrating

    data to less expensivemedia or using less frequent backupsmay find that VaR has

    jumped as end users face longer recovery times and greater disruption. On the

    other hand, a firm may find that an earlier decision to increase spending by

    adopting more reliable technology or to pursue a strict backup regimen has

    contributed to a decline in VaR in the current period. In a financial services setting,

    the VaR on an investmentcan be altered with hedging strategies but only at a cost

    to the firm [9]. In the case of information value, VaR can be manipulated through

    storage spending. As firms assess the risk to their informationfrom adverse events

    such as hardware failure or data corruption, their goal must be to link their current

    storage spending to VaR in order to decide if their current spending is too low, in

    which case VaR is dangerously high, or if spending is excessive, in which case

    VaR is unnecessarily low.

    4.2 Total Cost of Ownership

    Total Cost of Ownership (TCO) method is a technique which can be used

    to make sure that all associated costs over a given time period are considered

    when we are acquiring an asset

    TCO can be described as all costs of owning and operating an asset over

    time. TCO does not only reflect the costs of purchase. It also includes all other

    aspects in the further use and maintenanceof the asset.

    TCO was originally developed in the late 1980s by research company

    Gartner to determinethe cost of owning and deployingpersonal computers.

    There is no broad accepted formula for TCO. The main thought behind is

    that we need to consider all relevant costs which are related to an asset

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    15/25

    Information Life Cycle Management

    Dependingof the IT deploymentthe followingelementscan be includedin the

    Total Cost of OwnershipTCO:

    End-user computerHardwarepurchasecosts

    Softwarelicense purchasecosts

    Hardwareand SoftwareImplementation/ deploymentcosts

    Hardwarewarrantiesand maintenancecosts

    Softwarelicense tracking costs

    OperationsInfrastructure Costs

    Infrastructure (floor space) costs

    Cost for electricity and cooling

    Networkhardwareand softwarecosts

    Server hardwareand softwarecosts

    Testing costs

    Cost to upgradeor scalability

    IT Personnel costs

    Backupand RecoveryProcesscosts

    Costs associatedwith failure or outage

    Costs of security breaches(in loss of reputation and recoverycosts)

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    16/25

    Information Life Cycle Management

    Technologytraining costs of users and IT staff.

    Audit costs

    Insurancecosts

    Replacementcosts

    Migration costs

    Decommisioningcosts

    5. LINKING VAR TO STORAGE COSTS

    Since many firms have felt compelled to pursue ILM on the basis of cost

    criteria alone, total cost of ownership (TCO) is a standard metric for evaluating

    storage environments. Fixed and variable costs are accumulated for a defined

    period of time and divided by throughput, numberof users, data center capacity, or

    footprint to yield a measure of cost utilization. Although hardware costs are less

    than 30% of TCO[2], vendors continue to market hardwareas a way to lower TCO

    while, in reality, service or labor costs (least impacted by innovation) are the

    primary factors in TCO. Chargebacksystemsroutinely use TCO to assign storage

    costs to end users and so these costs are identifiable with some degree of

    accuracy.

    Relating storage TCO to VaR is complex. The critical task is to determine

    how VaR responds to a change in TCO. For firms to be fully insured against

    adverse events, the goal is to uncover a level of TCOwhere a marginal increasein

    storage spending (due to greater use of skilled labor, more frequent backups,

    increased monitoring, or more fault-tolerant hard-ware) is matched exactly by a

    marginal decreasein VaR.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    17/25

    Information Life Cycle Management

    As firms expand their storage costs, VaR declines consistent with faster

    recoverytimes and a reduction in the level of risk associatedwith systemsoutages.

    Since storage costs tend to increase in large rather than small dollar increments,the result is a down-ward sloping step-function linking VaR to TCO, as shown in

    Figure 2.

    5.1 Graph- VaR vs TCO

    Figure 2

    If TCO is low, reflecting an environment where storage costs have been

    excessively reduced, an increase in TCO will help to reduce VaR to more

    manageable levels. However, consistent with the law of diminishing marginal

    returns, at some point the marginal benefit from greater spending will be negligible.Beyond this point, spending is simply wasteful. The likelihood of unplannedevents

    means that some risks will remain and so, in absolute terms, VaR will approach a

    minimum(non-zero) threshold. Equally, TCO can never fall to zero due to certain

    fixed costs associatedwith embeddedsystems(for example, PC hard disks).

    To create this curve in reality, firms begin by plotting VaR (taken from their

    risk data in Figure 1) against their existing TCO. This yields a single point on the

    curve. Next, firms engage in a series of what-if exercises by asking how VaR

    might have changed if storage spending was increased or decreasedby a certain

    amount. This may seemhypothetical but, in reality, firms may already be doing this

    exercise when investigating how certain severe outages occurred and how they

    can be prevented in future. For example, firms may discover that a certain

    Department of Computer Science

    Value atRisk

    TCO

    Excessive VaR

    Point at which a marginal increase inTCO matches a marginal decline inVaR

    Excessive TCO

  • 8/6/2019 Information Life Cycle Management

    18/25

    Information Life Cycle Management

    percentageincreasein storage spendingwould have preventedor limited the most

    financially punitive outages, essentially reducingVaR.

    However, to fully appreciate the inverse link between VaR and TCO, it is

    not just enough to ask what can happen to VaR if TCO is increased. It is also

    essential to ask how much higher VaR might be if TCO was reduced. This

    hypothetical situation may seemunusual but high TCOcould mean that firms have

    overinsuredthemselvesagainst very small risks.

    6. DYNAMIC INFORMATION VALUE

    Despite uncovering an optimal balance between VaR and TCO, this

    balance can become distorted by changes in information value. ILM recognizes

    that information can increase and decrease in value over time, often in dramatic

    fashion.For example, in the airline industry, the value of a passengermanifest will

    fall to zero the instant that a flight has landed safely. Equally, in the

    pharmaceutical industry, the value of clinical trial data will increase once a drug

    application moves to the next stage of FDA approval, although the data itself is

    unchanged. Consequently, VaR will fluctuate based on where information is in its

    natural life cycle and how quickly it movesthroughthat life cycle.

    Similarly, legislation and the threat of lawsuits have altered the value of

    archival data to the extent that penalties and fines can be imposedif data is lost or

    unavailable to investigators. Hence, archival data may retroactively increase in

    value if a firm receives a court order to hand over its data, as was the case with

    Morgan Stanley where the discovery of 1,600 undocumented backup tapes was

    seen as evidenceof an attemptedcover-up [12].

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    19/25

    Information Life Cycle Management

    6.1 Responding to change in information value

    Figure 3

    As a consequence of an increase in the value of information, the curve

    linking VaR and TCOwill shift up and out, away from the origin.

    As seen in Figure 3, if a firm maintains the same level of TCO as before,

    making no changes to its storage architecture or storage practices, VaR will

    increase because of an increase in risk. The probability of a system outage may

    not have changed but the cost associated with an outage will increase

    commensuratewith an upwardshift in informationvalue.

    To re-establish equilibrium between VaR and TCO, a firm must either

    increase spending around its existing systems by, for example, expanding the

    frequency and scope of data backups, improving service and support, or by

    transferringthe informationto a safer and more secure set of technologies.

    When information falls in value as it nears the end of its useful life, the

    curve will shift down and in. If a firm maintains the same level of storage spending

    as before, it will have overinsured itself against relatively minor risks. The firm will

    still need to protect its data but not with the same level of spending as before. The

    simplest solution is to reduce TCO by transferring the data to less expensive

    media. This will allow VaR to increase to the point where VaR and TCO are again

    in equilibrium.

    7. IMPLEMENTING ILM IN PRACTICE

    Despite its intuitive appeal, ILM remains challengedby the complexnature

    of information value. At one extreme, all data is valuable when viewed through the

    Department of Computer Science

    Value atRisk

    TCO

    Constant TCO leads toexcessive VaR

    Constant TCO will lead tounnecessarily low VaR

    Increase ininformation value

    Decrease in information value

  • 8/6/2019 Information Life Cycle Management

    20/25

    Information Life Cycle Management

    eyes of end users who feel their data must be secured at all costs. Rather than

    haphazardlythrowingmoneyat an ever-increasingmountain of dataestimatedto

    be increasing by two exabytes (1018

    ) annually or 400MBfor each of the earths fivebillion inhabitants [10]an analysis of VaR can provide an objective overview of

    different instances when data was unavailable or when users were impacted by

    systemfailures.

    ILM tries to match storage systemcapabilities with informationvalue but as

    information value is resistant to measurement, erring on the side of increased

    storage spending constitutes the lesser of two evils. VaR, meanwhile, can be

    derived with some degree of accuracyon the basis that is it easier, for instance, to

    estimate the cost of an hour of CRMdowntimethan to accurately predict the value

    of a CRM application over its entire lifespan. Even if VaR and information value

    correlate, VaR is not a proxy for information value. It is true that some firms may

    invest in storage systems in order to improve information accessibility, accuracy,

    and relevance [5]ultimately seeking to boost sales or to enhance customer

    service and sup-port [7]but few look to storage systems as a competitive

    differentiator when the underlying hardwareis easily replicable.

    Storage remains an unavoidable cost of doing business. As such, VaR

    recognizes that storage is meant to protect data from adverse events that could

    give rise to financially damaging business disruptions or worse [12]. In practice,

    differences in information value across applications such as payroll (low value),

    email (mid-level value), and CRM (high value) are managed using different

    hardwaretiers; each tier offers a specific service level that matchesthe information

    value. Thus, high-value data is assignedto a premiumtier where TCOand service

    levels are high while low-value data is assignedto a basic tier where TCOis lower.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    21/25

    Information Life Cycle Management

    To implement ILM is to determine a level of storage spending that fully

    insures firms against the consequencesof data loss, corruption, or inaccessibility. If

    storage spending is seen as the premiumon an information insurancepolicy, VaRrepresents the deductible on that policy. Perceptually, falling hardware costs have

    created a false belief that a firm is implementing ILM if it spends more on storage

    and saves all its data.

    Without some consideration of VaR, however, firms have no appreciation

    of the risks they face if their data is lost or corrupted. Consequently, VaR can

    significantly improvethe implementationof ILM.

    ILM products automate the processes involved, typically organizing data

    into separate tiers according to specified policies, and automating data migration

    from one tier to another. As a rule, newer data, and data that must be accessed

    more frequently, is stored on faster, but more expensive storage media, while less

    critical data is stored on cheaper, but slower media. However, the ILM approach

    recognizes that the importance of any data does not rely solely on its age or how

    often it's accessed. Users can specify different policies for data that declines in

    value at different rates or that retains its value throughout its life span. A path

    management application, either as a component of ILM software or working in

    conjunction with it, makesit possible to retrieve any data stored by keeping track of

    where everything is in the storage cycle.

    Whereas data classifications vary widely among organizations, there are

    common methodologies for classifying storage. Most organizations organize their

    storage resources into three general classes: primary (high value, very fast

    storage), secondary (medium value, fast storage), and tertiary (low value, offline

    storage). SANs and direct-attached storage (DAS) are often used for high-value

    data storage. SANs tend to be used for enterprise, high-availability, high-

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    22/25

    Information Life Cycle Management

    performance, clustered applications, whereas DAS houses legacy data that is still

    highly valued. NAS and ATA disk arrays are typically categorized as secondary

    storage. NAS devices are used for file sharing, user data, and first-level backup,although more and more NAS devices are being used as primary storage devices

    to replace and consolidate direct-attachedfile storage.

    Serial ATA disk arrays are typically used to store less-critical, older data or

    fixed-content reference data that can be easily recovered or rebuilt. Serial ATA

    disks are also used as first-level backup. Tape, optical disks, and other write-once

    devices are usually considered tertiary storage. They are most often used for

    backup, archiving, and vaulting. Replicating data among primary storage and other

    levels of storageis commonlydone to improveavailability, reliability, and recovery.

    Common attributes used to define classes of storage are reliability,

    availability, performance, accessibility, security, price, and capacity. With advances

    in storage performance today, availability tends to be the primary factor that

    determinesvalue amongdifferent storage devices. As with data classification, tools

    that automatically discover storage resources and classify them based on these

    attributescan significantly simplify storage administration.

    7.1 IBM ILM solutions

    IBM has a history of data retention and management solutions, and is a

    leader in ILM solutions. ILM solutions make the best use of a tiered hierarchy of

    storage systems. IBMs disk systems (including midrange TotalStorage DS4000

    and enterprise-class DS6000 and DS8000) and tape systems (including

    TotalStorage 3592 and LTO Generation 3, both with write-once read-many

    (WORM) capability) offer an outstanding range of options from which to build a

    hierarchy.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    23/25

    Information Life Cycle Management

    For data retention solutions, the IBM TotalStorage DR550 complements

    this hierarchy with a complete system designed to deliver policy-based, non-

    erasable, non-rewriteable storage to help meet legislative compliancerequirements. ILM solutions require close integration with applications, so

    middlewaresys - 28 -tems such as IBM DB2 Content Manager, IBM DB2

    Records Manager and IBM DB2 CommonStore are key components in IBM ILM

    solutions.

    8. CONCLUSION

    Faced with rapidly expanding mountains of data and new government

    regulation, IT managers are using ILM to bring order to a storage domain that has

    previously been ignored because of its low strategic value. If data and information

    are essential to a firms strategic positioning, storage must be seen in a new light.

    A frameworkthat enhancesILM by clarifying the relationship betweenVaR

    and TCO, a relationship that is often in flux because of the dynamic nature ofinformation value and firms growing desire to capture data on multiple aspects of

    their business. By considering this frameworkand VaR in particular, we argue that

    IT managerscan forge an effective and secure storageenvironment.

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    24/25

    Information Life Cycle Management

    9. REFERENCES

    1. Paul Tallon and RichardScannell, InformationLife Cycle

    Management, Communications of the ACM, Volume 50, Issue 11, November2007, 65-69

    2. Allen, N. Dont waste your storage dollars: What you need to know, Gartner

    Group Research Report COM-13-121 7, 2001.

    3. Carr, N. IT doesnt matter. Harvard Business Review 8 1, 5 (2003),

    4. CIO Insight. Is your IT budget being spent effectively?Feb. 2005,

    5. Davenport, T. Information Ecolog y. Oxford University Press, New

    York, NY, 1997.

    6. Gilheany, S. The Decline of Magnetic Disk Storage Cost over the

    Next 25 Years. Berghell Associates, 2004;

    7. Glazer, R. Measuring the value of information: The information-intensive

    organization. IBM Systems Journal 3 2, 1 (1993), 99110.

    8. Goodwin, P. Enterprise SAN-attached storage: Market overview. Meta Group

    Repor t, 2003.9. Jorion, P. Value at Risk: The New Benchmark for Managing

    Financial Risk, Second Editio n. McGrawHill, NY, 2001.

    10. Lyman, P. and Varian, H. How Much Information? UC, Berkeley,

    School of InformationManagementand Systems,2003;

    11. Mata, F., Fuerst, W., and Barney, J. Information technology and sustained

    competitive advantage: A resource-based analysis. MIS Quarterly 1 9, 4 (1995),

    487505.

    12. Wall Street Journal. How Morgan Stanley botched a big case by fumbling

    emails. May 16, 2005.

    13.http://www.oracle.com/technology/deploy/ilm/pdf/ILM_for_Business_11g.pdf

    14.http://www-03.ibm.com/systems/resources/

    systems_storage_news_center_solutions_pdf_ilm.pdf

    Department of Computer Science

  • 8/6/2019 Information Life Cycle Management

    25/25

    Information Life Cycle Management

    15.http://www.computerworld.com/hardwaretopics/storage/story/0,10801,79885,00.

    html