11:41 PM
Terry Sweeney
Terry Sweeney
Connect Directly

A Paradigm Spins Down

Which is better (and less cliché) than a paradigm that shifts, in my opinion. But based on public and private comments from readers, it's well past time to do away with these fault-prone spinning platters called storage arrays. Here's why.

Which is better (and less cliché) than a paradigm that shifts, in my opinion. But based on public and private comments from readers, it's well past time to do away with these fault-prone spinning platters called storage arrays. Here's why.This conversation -- that spinning drives are the data center's clunkiest dogs -- isn't a new one. But what it took to change the tenor of what's been repeated during the last five years was the voice a of a large and influential user. Specifically Google. About a year ago, the search engine giant released a study that severely undercut the performance guarantees of the major disk vendors.

Robin Harris covered this interesting issue in his Storage Mojo blog, and also included a thorough discussion of what's meant and implied in the terms mean time between failure (MTBF) and annual failure rates (AFR), two metrics that are the basis of vendor warranties.

Then, earlier this past March, some researchers from the University of Illinois did some piling on. Yes, disk failure contributes to 20% to 55% of storage subsystem failures; unfortunately, other physical interconnects like broken wires, shelf enclosure power outages, and HBA failures accounted for anywhere from 27% to 68% of problems. Ouch.

So as I look out on the horizon and see solid state, flash, even holographic storage, I wonder what it will take for the industry to wean itself off of spinning disk. Vendors have plenty invested in the systems and interfaces, not to mention a nasty dependence on the revenue stream they derive from these commodity products. Google and some academicians can't single-handedly shame makers of storage products away from disk. But they can shift the conversation so that there's discussion of amazing levels of reliability, rather than repair or replacement.

There's a paradigm that data center pros would be happy to adopt.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Microsoft Word Vuln Went Unnoticed for 17 Years: Report
Kelly Sheridan, Associate Editor, Dark Reading,  11/14/2017
Companies Blindly Believe They've Locked Down Users' Mobile Use
Dawn Kawamoto, Associate Editor, Dark Reading,  11/14/2017
121 Pieces of Malware Flagged on NSA Employee's Home Computer
Kelly Jackson Higgins, Executive Editor at Dark Reading,  11/16/2017
Register for Dark Reading Newsletters
White Papers
Current Issue
Managing Cyber-Risk
An online breach could have a huge impact on your organization. Here are some strategies for measuring and managing that risk.
Flash Poll
[Strategic Security Report] Cloud Security's Changing Landscape
[Strategic Security Report] Cloud Security's Changing Landscape
Cloud services are increasingly becoming the platform for mission-critical apps and data. Heres how enterprises are adapting their security strategies!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.