News
2/5/2009
05:17 PM
George Crump
George Crump
Commentary
50%
50%

An SSD Strategy We Can Believe In?

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.The challenge has been that SSD is being viewed as a game changer offering 30X performance. Inserting this technology into systems that were designed for comparatively clunky mechanical drives caused a number of problems, not the least of which was it did not enable the technology to deliver its full performance promise. That's critical because of the cost premium compared with the mechanical offering. If you're going to pay extra to get a 30X performance boost, only getting a 15X boost can be disappointing.

Where most of the major manufacturers miss the point on SSD is that it's application-specific storage, designed and purchased to enhance the performance of a specific application with a relatively small capacity requirement yet a huge level of importance to the revenue generation of the organization. This is the opposite of what traditional storage manufacturers commonly provide: universal storage for all applications. Yes, it can be tweaked and fine-tuned, but as a percentage the overall system delivers roughly the same performance to every application storing data on it.

What NetApp did right is it has segmented the nonmoving parts of its storage away from the mechanical spindles. First with its Performance Acceleration Module (PAM), it has a cost-effective solution to handle random read workloads like file services or Exchange. The second thing it did right was leverage its vFiler Technology and partner with Texas Memory Systems for environments that have random I/O workloads like database applications and HPC environments.

The critical components of this decision is it segmented mechanical moving storage away from solid-state storage and partnered with an organization with years, actually decades, of experience delivering solid-state technology. In doing so, NetApp is still able to deliver cost-effective enclosures that are well suited for mechanical technology while at the same time have an optimized path for the high-speed solid-state technology.

Outside of PAM, the key is that vFiler can leverage other disk manufacturers and, in this case, totally different technology, which means that, for NAS solutions, companies like ONStor and BlueArc can offer an independent SSD channel. For raw block storage support of SSD, you can just attach it to your SAN and manage it separately or leverage a virtualization solution like DataCore's SAN Symphony to have a unified management umbrella.

Either way we're starting to see suppliers get it. The SSD channel has to be independent of the mechanical drive channel. Mixing the two technologies into the same shelf or bus will deliver less-than-desirable results.

To understand more about solid-state disk, register for our Webinar, "The State Of Solid State Storage."

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-2208
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

CVE-2014-2209
Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

CVE-2014-5386
Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

CVE-2014-6228
Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

CVE-2014-6229
Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.