Central phone number
Feel free to contact us!

+49 371 2371-0


Central fax number
Feel free to contact us!

+49 371 2371-150


Support hotline
We answer your questions

+49 371 2371-250

Send an email

IT security & infrastructures

IT Sizing - Planning and implementation of a storage system

Data is at the heart of every business today. While only ten years ago it was sufficient to simply store data on PCs, both the volumes of data and their importance have increased enormously. From sales and production to warehousing and shipping, all areas of business are now largely digitized.

In this era, modern storage systems play a central role, acting as a hub where all the company's knowledge capital is guarded. In view of the constantly increasing flood of data, it is of utmost importance to pay due attention to the design of such storage systems and to carry out careful IT dimensioning in advance. The following is a compilation of the aspects that should be analyzed and defined in advance.

IT Sizing - Customized configuration of your IT system

The basis for almost every IT project and for an efficiently and securely functioning IT infrastructure is the implementation of an IT sizing.

We record your requirements and carry out an as-is analysis before IT sizing. In this way, when planning and configuring the new IT infrastructure, existing resources can continue to be used and optimally integrated into the new IT infrastructure, taking into account the planned useful life.

According to the needs and requirements, the selection and configuration of the following items are among the contents of an IT sizing:

  • CPU (processor)
  • RAM (main memory)
  • Storage media (HDD hard disks or SSD)
  • Graphics card
  • Integration of virtual machines
  • Network connections and network speeds
  • UPS to prevent data loss in case of power failure
  • External storage systems (NAS, tape library, tape drive)
  • Backup
  • Firewall
  • ...

The 5 key criteria for the implementation of a storage system

Before implementing a new storage system, the following five issues should be analyzed as part of IT sizing to optimize data protection and availability:

  1. I/O requirements of your mission-critical applications:
    Every application in the enterprise creates some I/O load on your data storage, which affects performance. To ensure your critical applications get the performance they need, there is a focus on performance. This relates to the choice between SSD and classic SAS disks, as well as the ability to automate distribution through storage tiering.
     
  2. Actual data volumes:
    There is often a lack of accurate information about the actual amount of data without compression and deduplication. A closer look at current data volumes not only enables informed storage sizing, but also allows conclusions to be drawn about future growth and thus future-proof system scaling.
     
  3. Availability:
    Despite the enormous importance of data to any business, there are different levels of availability to consider. Issues such as backup recovery time and disaster recovery need to be addressed to balance security considerations and budget.
     
  4. SAN or hyperconvergence?
    The issue here is whether a traditional storage area network (SAN) solution with disk array, server and tape library or a hyperconverged infrastructure makes more economic sense. The latter uses shared storage at the server level and provides resilience through shared storage.
     
  5. Backup capacity (volume and performance):
    In addition to current and expected data volumes in production operations, backup capacities and performance must also be considered. Here, outsourcing rarely used data to slower media can optimize the overall performance of the system.

Our IT specialists are available to answer all these questions. Just get in contact with us. The individual points are examined and defined in an IT sizing. On this basis, we then select and dimension your future storage system - tailored to your company and your requirements.

Lucas Hübert - Vertrieb IT-Security und Infrastruktur | Standort Chemnitz
SIGMA Bot IconSIGMA bot
IT security & infrastructures

Welcome to the SIGMA Chatbot!

Thank you for using our chatbot. Our chatbot is here to answer your questions and provide solutions. Here are some instructions for use:

1. Asking questions

Pose your question directly in the chat window. Our chatbot utilizes comprehensive data knowledge derived from one of our internal databases and text documents containing marketing information about products and services of the SIGMA Group, enabling the chatbot to provide you with detailed answers

2. Providing feedback

After the chatbot has responded, you have the option to rate the answer. This helps us understand how well the chatbot responds to different inquiries. Provide feedback on whether the answer was helpful or not.

3. Contacting the sales team

If the chatbot cannot provide a satisfactory answer, you have the option to send a request directly to our sales team from the chatbot window. We will assist you personally.

4. Email forwarding

If you wish to end the conversation with the chatbot or receive information via email, the chatbot offers the option to forward the conversation via email. Simply click "Send answer via email," enter your email address, and a few seconds later, the conversation with our SIGMA chatbot will be forwarded to your email address.

5. Chatbot optimization

We value your feedback! Ratings help us continuously improve and optimize the chatbot. Let us know what you like and where we can further improve. Feel free to send your feedback via email as well - marketing@sigma-chemnitz.de.

Thank you for using our chatbot. We hope it can effectively assist you with your concerns. If you have any further questions, we are here to help.

Privacy Information for Users of Our SIGMA Question Bot (Privacy Policy)

Use of Chatbot

(1) This website uses a chatbot developed exclusively by us. The chatbot is a software-based dialog system that enables text- or voice-based communication with a technical system.
The chatbot operates on the RAG (Retrieval-Augmented Generation) approach, retrieving data from a database to answer questions as accurately as possible. These data, along with the user’s question, are sent to the language models of OpenAI, Inc. without transmitting any personal information about the user. The models attempt to answer the question using the provided data and return the response. The data are sourced from one of our internal databases, comprising text documents with marketing information about products and services of the SIGMA Group.

(2) The following data are processed: session ID for user requests, the time of the request, the request itself, the chatbot’s response, the topic, and the language.

(3) We process this data to analyze the productivity of our chatbot and to continuously improve it. This includes the following purposes:

  • Chatbot performance optimization: We collect and analyze interactions with the chatbot to evaluate its efficiency and performance. This includes, for example, questions the chatbot could not answer, repeated inquiries on specific topics, and similar issues.
  • Enhancing the user experience: We use data to improve the user experience. This includes analyzing user feedback to make adjustments and expansions to the chatbot to better meet your needs.
  • Error detection and resolution: The data allow us to detect errors and issues in real time, enabling faster resolution and updates to the chatbot.
  • Statistical evaluations: We generate aggregated, anonymized statistical reports on chatbot usage. These reports contain no personal information and serve to analyze trends and patterns.

The legal basis is Article 6(1) Sentence 1 lit. f GDPR.

SIGMA Bot Icon

Hello! I’m the SIGMA Question Bot, and I’m happy to answer your questions about IT security and infrastructure.

Contact us
Topic
I am the
SIGMA Question Bot.
I can help you at lightning speed.