News
2/5/2009
05:17 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

An SSD Strategy We Can Believe In?

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.The challenge has been that SSD is being viewed as a game changer offering 30X performance. Inserting this technology into systems that were designed for comparatively clunky mechanical drives caused a number of problems, not the least of which was it did not enable the technology to deliver its full performance promise. That's critical because of the cost premium compared with the mechanical offering. If you're going to pay extra to get a 30X performance boost, only getting a 15X boost can be disappointing.

Where most of the major manufacturers miss the point on SSD is that it's application-specific storage, designed and purchased to enhance the performance of a specific application with a relatively small capacity requirement yet a huge level of importance to the revenue generation of the organization. This is the opposite of what traditional storage manufacturers commonly provide: universal storage for all applications. Yes, it can be tweaked and fine-tuned, but as a percentage the overall system delivers roughly the same performance to every application storing data on it.

What NetApp did right is it has segmented the nonmoving parts of its storage away from the mechanical spindles. First with its Performance Acceleration Module (PAM), it has a cost-effective solution to handle random read workloads like file services or Exchange. The second thing it did right was leverage its vFiler Technology and partner with Texas Memory Systems for environments that have random I/O workloads like database applications and HPC environments.

The critical components of this decision is it segmented mechanical moving storage away from solid-state storage and partnered with an organization with years, actually decades, of experience delivering solid-state technology. In doing so, NetApp is still able to deliver cost-effective enclosures that are well suited for mechanical technology while at the same time have an optimized path for the high-speed solid-state technology.

Outside of PAM, the key is that vFiler can leverage other disk manufacturers and, in this case, totally different technology, which means that, for NAS solutions, companies like ONStor and BlueArc can offer an independent SSD channel. For raw block storage support of SSD, you can just attach it to your SAN and manage it separately or leverage a virtualization solution like DataCore's SAN Symphony to have a unified management umbrella.

Either way we're starting to see suppliers get it. The SSD channel has to be independent of the mechanical drive channel. Mixing the two technologies into the same shelf or bus will deliver less-than-desirable results.

To understand more about solid-state disk, register for our Webinar, "The State Of Solid State Storage."

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6335
Published: 2014-08-26
The Backup-Archive client in IBM Tivoli Storage Manager (TSM) for Space Management 5.x and 6.x before 6.2.5.3, 6.3.x before 6.3.2, 6.4.x before 6.4.2, and 7.1.x before 7.1.0.3 on Linux and AIX, and 5.x and 6.x before 6.1.5.6 on Solaris and HP-UX, does not preserve file permissions across backup and ...

CVE-2014-0480
Published: 2014-08-26
The core.urlresolvers.reverse function in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not properly validate URLs, which allows remote attackers to conduct phishing attacks via a // (slash slash) in a URL, which triggers a scheme-relative URL ...

CVE-2014-0481
Published: 2014-08-26
The default configuration for the file upload handling system in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 uses a sequential file name generation process when a file with a conflicting name is uploaded, which allows remote attackers to cause a d...

CVE-2014-0482
Published: 2014-08-26
The contrib.auth.middleware.RemoteUserMiddleware middleware in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3, when using the contrib.auth.backends.RemoteUserBackend backend, allows remote authenticated users to hijack web sessions via vectors relate...

CVE-2014-0483
Published: 2014-08-26
The administrative interface (contrib.admin) in Django before 1.4.14, 1.5.x before 1.5.9, 1.6.x before 1.6.6, and 1.7 before release candidate 3 does not check if a field represents a relationship between models, which allows remote authenticated users to obtain sensitive information via a to_field ...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.