• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About
    • Stephen Foskett
      • My Publications
        • Urban Forms in Suburbia: The Rise of the Edge City
      • Storage Magazine Columns
      • Whitepapers
      • Multimedia
      • Speaking Engagements
    • Services
    • Disclosures
  • Categories
    • Apple
    • Ask a Pack Rat
    • Computer History
    • Deals
    • Enterprise storage
    • Events
    • Personal
    • Photography
    • Terabyte home
    • Virtual Storage
  • Guides
    • The iPhone Exchange ActiveSync Guide
      • The iPhone Exchange ActiveSync Troubleshooting Guide
    • The iPad Exchange ActiveSync Guide
      • iPad Exchange ActiveSync Troubleshooting Guide
    • Toolbox
      • Power Over Ethernet Calculator
      • EMC Symmetrix WWN Calculator
      • EMC Symmetrix TimeFinder DOS Batch File
    • Linux Logical Volume Manager Walkthrough
  • Calendar

Stephen Foskett, Pack Rat

Understanding the accumulation of data

You are here: Home / Everything / Enterprise storage / Four Fundamental Best Practices for Enterprise IT

Four Fundamental Best Practices for Enterprise IT

September 24, 2010 By Stephen Leave a Comment

Every technician develops a set of tools and practices that serve them well. In this post, I present my best practices for enterprise IT.

Although many people are cynical about the whole idea of best practices, I’m a believer. I think that such beasts do exist, just that too many companies, analysts and especially consultants spend too much time applying the label to whatever works in their best interest at the time. To counteract this cesspool of non-best practices, I thought it best to put down a few ideas of my own. Following are four fundamental best practices I have distilled from almost 20 years in enterprise IT. I wonder if you agree with them.

Before proceeding, I suggest that you take a look at the three principle tests that I use to define a best practice.

Best practice 1: Minimize Complexity

IT has a tough position in business. We are ignored while everything is working well, and in trouble when things start falling apart. We are held accountable, but generally cannot control our own destiny. The only way we have a fighting chance is to minimize the complexity of the solutions we must support.

As I said in Sailing the Titanic (Why We Need ILM and Then Some!):

“To make a timely (and tired) Harry Potter analogy, IT are the house-elves of the business — powerful but subservient, with little input into what happens above and around them.”

This is where the current trends of virtualization, consolidation, and standardization comes in. A single administrator can manage a far-larger environment if it’s standardized, and these systems tend to be far more reliable as well.

Sadly, minimizing complexity is the antithesis of a true hacker’s heart. Who wouldn’t want to play with the latest and greatest toys? Why not build an intricate and interconnected system? But these solutions fail my “best practices” test: They’re risky, unusual and just plain imprudent.

Best Practice 2: Use the Right Tool For the Job

Any woodworker or mechanic will tell you that using the right tool makes any job easier. Even if it works, it’s just bad practice to masquerade network-attached storage (NAS) as a block device or a storage area network (SAN) as a collection of shared files. I am always skeptical of so many oddball innovations trumpeted by vendors large and small because they seem to fail the “right tool” practice.

I wrote more about this in Use Process Solutions For Process Problems, Technical Solutions For Technical Ones and Why Do I Ignore NAS?

But sometimes they work out just fine. You see, best practices can’t predict the future or what works in a certain situation. It’s better to minimize complexity and stick to what you know than to press for the perfect solution every time. It wouldn’t be right to bring SAN storage into an all-NAS environment just for a single database application, for example. Although we generally shouldn’t try to drive a nail with a screwdriver, it can be the best option when a hammer can’t be found!

Best Practice 3: Prepare For Failure

The hacker in me is tempted to stop tinkering as soon as a system is functional, but the realist in me knows that I have to make it twice as good. You can’t prepare for every eventuality, but you can seek out probable points of failure and harden them.

For example, see Chris Evans’ discussion of Choosing Between Monolithic and Modular Architectures

Many of the fundamental best practices in enterprise IT come down to this. Redundancy from RAID and N+1 components, the widespread use of multi-path technology, and high-availability design are all examples of preparing for the worst. We would not bother with all of this if we didn’t know that errors occur even in well-engineered systems, and that everything we build is sensitive to failure.

Best Practice 4: Align Expectations with Reality

We all face conflicting demands, and we are tempted to offer best-case responses to keep everyone happy. But excessive optimism leaves IT folks stressed and end users frustrated when things don’t go right. It’s time to adjust expectations.

See The Techie/Business Schism, where I talk about the looming disconnect even within IT

Concepts like service level agreements (SLAs) and business impact analyses come from an innate knowledge that the real world doesn’t always conform to the best-case assumption. Although we don’t have real control over user demands, we can try to set correct expectations by admitting what we can and can’t do realistically.  Don’t let those who rely on us labor under misconceptions of our capabilities.

Stephen’s Stance

We can’t let others lead us astray with talk of “best practices”, but we can define some of our own. My three-part best practices test, and these four general practices, have served me well over the years. What are your best practices?

Image credits: Dave’s Bike Tools by bre pettis

You might also want to read these other posts...

  • What You See and What You Get When You Follow Me
  • Electric Car Over the Internet: My Experience Buying From…
  • How To Install ZeroTier on TrueNAS 12
  • Liberate Wi-Fi Smart Bulbs and Switches with Tasmota!
  • Scam Alert: Fake DMCA Takedown for Link Insertion

Filed Under: Enterprise storage, Everything, Gestalt IT, Personal Tagged With: alignment, best practices, complexity, high availability, redundancy, SLA, standardization

Primary Sidebar

Private information is practically the source of every large modern fortune.

Oscar Wilde

Subscribe via Email

Subscribe via email and you will receive my latest blog posts in your inbox. No ads or spam, just the same great content you find on my site!
 New posts (daily)
 Where's Stephen? (weekly)

Download My Book


Download my free e-book:
Essential Enterprise Storage Concepts!

Recent Posts

How To Install ZeroTier on TrueNAS 12

February 3, 2022

Scam Alert: Fake DMCA Takedown for Link Insertion

January 24, 2022

How To Connect Everything From Everywhere with ZeroTier

January 14, 2022

Electric Car Over the Internet: My Experience Buying From Vroom

November 28, 2020

Powering Rabbits: The Mean Well LRS-350-12 Power Supply

October 18, 2020

Tortoise or Hare? Nvidia Jetson TK1

September 22, 2020

Running Rabbits: More About My Cloud NUCs

September 21, 2020

Introducing Rabbit: I Bought a Cloud!

September 10, 2020

Remove ROM To Use LSI SAS Cards in HPE Servers

August 23, 2020

Test Your Wi-Fi with iPerf for iOS

July 9, 2020

Symbolic Links

    Featured Posts

    The Fat Middle: Today’s Enterprise Storage Array

    August 31, 2014

    United Boeing 787 Dreamliner: Butt-In-Seat Economy Plus Review!

    November 13, 2012

    Why I Am Biased Against FCoE

    October 21, 2011

    Aerobie AeroPress Review: The Hacker Coffee Maker

    February 7, 2011

    It’s Time To Speak Out Against Sexism In IT Recruiting

    May 6, 2013

    What’s (Still) Wrong With Dropbox For Business

    April 17, 2013

    New England Takes On Seattle To Determine Who’s Number 2 … In Tech!

    January 19, 2015

    Defining Failure: What Is MTTR, MTTF, and MTBF?

    July 6, 2011

    Edward Snowden Is Right: We Must Protect The Internet

    March 19, 2014

    Sony NEX-7 Hands-On Review Part 1: The New Super-Camera

    March 26, 2012

    Footer

    Legalese

    Copyright © 2022 · Log in