News
11/22/2010
05:18 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Does SSD Make Sense In The Small Data Center?

Solid State Storage is often thought of as being used in one of two extremes. Either in the high end enterprise to acceleration databases or in the consumer netbook, smartphone market. The truth is that solid state storage can be used in a wide variety of applications in businesses of all sizes. The small data center with two to three servers should not exclude SSD from it's consideration.

Solid State Storage is often thought of as being used in one of two extremes. Either in the high end enterprise to acceleration databases or in the consumer netbook, smartphone market. The truth is that solid state storage can be used in a wide variety of applications in businesses of all sizes. The small data center with two to three servers should not exclude SSD from it's consideration.While in a recent blog we discussed the advantages of a memory module based solid state storage, this market may be an ideal match for disk form factor SSDs. This is because the small sized data center already has existing servers and may not need a SAN or certainly a large SAN with SSD just yet. Their servers often have available drive slots that the SSD can be inserted into. Finally most of these small business class servers also make adding a drive easy, while getting to the internals of the system to add an SSD card may be more challenging.

When should a small data center use SSD? Many of the use cases that we discuss in our article "Improving Storage Performance in the Medium-Sized Enterprise" also apply to a smaller data center as well. Even if you only have a sever or two adding SSD to them can greatly improve performance. In most cases this does not mean switching over entirely to SSD either but leveraging the technology as a cache or storage area for highly active but temporal data like transaction log files. Installing an SSD as a second drive and then moving those types of files to that drive can greatly improve performance of a system that is being pushed to its limits, preventing a server upgrade without dramatically changing day to day work flows. Which not only saves the cost of buying new hardware but the time and expertise required to move an application from the old server to the new.

For example several of the operating system vendors are partnering with server hardware vendors to offer preconfigured small business bundles with a few core applications like email, databases and web services already installed on the server hardware. Since many of these servers are supplied with simple SATA hard disks, as the needs of the business grow, these starter servers may exhibit performance problems that quite often can be related to storage performance. Instead of upgrading the server or even installing a faster hard drive it may make more sense to add a secondary SSD to these servers and set the applications to store those very active files on the SSD.

Even if the smaller data center is considering its first SAN to take advantage of server virtualization, a local SSD in the server can help. Most entry level SANs are iSCSI or NFS based utilizing 1GbE connections to keep costs down. The problem is that even a small data center can at times see performance issues with 1GbE connections. Leveraging an SSD to keep temporal high I/O type of traffic off of the 1GbE connection may keep those peaks from causing a performance problem.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.