News
2/5/2009
05:17 PM
George Crump
George Crump
Commentary
50%
50%

An SSD Strategy We Can Believe In?

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.

NetApp this week began to enhance its solid-state disk strategy. I have been critical of traditional storage suppliers' efforts in trying to incorporate SSD into their overall storage offerings. This time someone is finally getting close.The challenge has been that SSD is being viewed as a game changer offering 30X performance. Inserting this technology into systems that were designed for comparatively clunky mechanical drives caused a number of problems, not the least of which was it did not enable the technology to deliver its full performance promise. That's critical because of the cost premium compared with the mechanical offering. If you're going to pay extra to get a 30X performance boost, only getting a 15X boost can be disappointing.

Where most of the major manufacturers miss the point on SSD is that it's application-specific storage, designed and purchased to enhance the performance of a specific application with a relatively small capacity requirement yet a huge level of importance to the revenue generation of the organization. This is the opposite of what traditional storage manufacturers commonly provide: universal storage for all applications. Yes, it can be tweaked and fine-tuned, but as a percentage the overall system delivers roughly the same performance to every application storing data on it.

What NetApp did right is it has segmented the nonmoving parts of its storage away from the mechanical spindles. First with its Performance Acceleration Module (PAM), it has a cost-effective solution to handle random read workloads like file services or Exchange. The second thing it did right was leverage its vFiler Technology and partner with Texas Memory Systems for environments that have random I/O workloads like database applications and HPC environments.

The critical components of this decision is it segmented mechanical moving storage away from solid-state storage and partnered with an organization with years, actually decades, of experience delivering solid-state technology. In doing so, NetApp is still able to deliver cost-effective enclosures that are well suited for mechanical technology while at the same time have an optimized path for the high-speed solid-state technology.

Outside of PAM, the key is that vFiler can leverage other disk manufacturers and, in this case, totally different technology, which means that, for NAS solutions, companies like ONStor and BlueArc can offer an independent SSD channel. For raw block storage support of SSD, you can just attach it to your SAN and manage it separately or leverage a virtualization solution like DataCore's SAN Symphony to have a unified management umbrella.

Either way we're starting to see suppliers get it. The SSD channel has to be independent of the mechanical drive channel. Mixing the two technologies into the same shelf or bus will deliver less-than-desirable results.

To understand more about solid-state disk, register for our Webinar, "The State Of Solid State Storage."

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas and her guest, David Shearer, (ISC)2 Chief Executive Officer, as they discuss issues that keep IT security professionals up at night, including results from the recent 2016 Black Hat Attendee Survey.