News
8/4/2008
04:48 PM
George Crump
George Crump
Commentary
50%
50%

Enterprise Solid State Disk - Where Are We?

It seems like everyone is jumping into SSD (Solid State Disk) today. EMC, Sun, Hitachi, HP, and others have all made announcements about adopting SSD. As I discussed in an earlier entry, the numbers certainly make good conversation pieces, but where are we in terms of ma

It seems like everyone is jumping into SSD (Solid State Disk) today. EMC, Sun, Hitachi, HP, and others have all made announcements about adopting SSD. As I discussed in an earlier entry, the numbers certainly make good conversation pieces, but where are we in terms of market adoption?IDC recently wrote a report stating 70% compounded annual growth rate over the next five years. That makes for a very hot market. Or are we somewhere else with market adoption? Growing, but at a much slower pace. If adoption is slower, it will tend to benefit the legacy SSD companies like Solid Data and Texas Memory Systems, not the larger system vendors. These companies are all pretty lean and mean; any growth in the market is good for them.

To determine market growth, you have to look at what people can or want to do with an enterprise SSD. As you can guess, performance is the key and often only issue when deciding if you should deploy a SSD. For the price delta of SSD vs. spinning disk, that performance gain has to be significant vs. what can be had with today's advanced disk technologies.

Also, the application has to actually be able to take advantage of the speed available to it. For now, that comes down to a very finite number of applications which are directly responsible for revenue production within an organization. Almost always the entire application can't take advantage of the performance offering of SSD, only a few very active hot files. These hot files end up on SSD's. In general, these files are manually moved to the SSD by a savvy system or database administrator. It's not very fancy nor very automated, but it works and delivers often very impressive results. improving overall application performance while at the same time reducing the number of servers required by the application. These workloads tend to be small enough that they typically are being placed on DRAM-based, not Flashed SSD's. Why? From an enterprise perspective, they are by far the most commonly deployed type of SSD, Flash-based systems just came into full light over the last 12 months. There are some technical reasons as well; although being more expensive, DRAM delivers consistent random I/O performance across both reads and writes. Flash-based systems, on the other hand, offer solid performance in read operations but take a significant hit on write performance, compared with DRAM, although they're still faster than hard disk writes.

Despite this, looking forward into the next year, Flash SSD's, because of pricing advantage, will provide most of the unit growth in the SSD space and as long as they are used in the correct, read heavy workload, will still make a significant improvement to performance. The comparison between the two types of SSD technologies are important because most of the storage system suppliers today are using Flash-based technology, and they don't have the option of offering DRAM when it makes sense to. This will require that these legacy storage solution providers gain expertise in this game-changing performance solution and that they advise the customer correctly when they might be better off with a DRAM-based solution vs. a Flash-based solution. Improving the performance of key applications will still be the primary motivator, and is an area where the SSD specialists will have a distinct advantage.

Deploying SSD will require expertise not only from the SSD supplier but also from the customer. Each solution will have to be examined in a linear fashion to make sure the right type and quantity of that technology is applied. While the price can now be much more easily justified against the performance requirements, this analog deployment style will make a market growth more modest. I don't think we will see the 70% CAGR until we see better integration at the storage system level make this a more automated process. Until SSD-based systems are so large and so inexpensive that the price difference is negligible, we will need storage solutions that will automatically move hot blocks of data in and out of the SSD.

We will detail that in an upcoming entry.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.