News
10/31/2008
09:01 AM
George Crump
George Crump
Commentary
50%
50%

SSDs Are Not Confusing

Seems like every vendor I speak with is laying out its solid-state disk (SSD) strategy, and almost all say they're trying to help the customer through this confusing platform change. It's not confusing.

Seems like every vendor I speak with is laying out its solid-state disk (SSD) strategy, and almost all say they're trying to help the customer through this confusing platform change. It's not confusing.Today SSDs' primary function is to accelerate databases. There are specific files in a database that, under intense load, get hot. These files are ideal to put on SSD. The second practical use case is actually in a NAS environment where thousands of users are viewing the same set of data over and over again; examples might be product images for a catalog site or heavily hit videos on a video-sharing site. While there are other use cases, these are the big two, and really databases today represent the lion's share of the market.

In my experience, if you have one of these situations you know it. You are probably using or looking at using short stroking to address the performance issues, and at that point SSD begins to make sense, not only for performance but also for cost savings. Implementing SSD can reduce the number of physical spindles required, which saves power; it can reduce adding servers to add access bandwidth; and it can reduce the amount of time spent tuning the database that happens in these environments.

Why is this confusing? First, because the vendors getting into this space are new to it and they are trying to figure it out. In many cases some of their other solutions, like wide striping or enhanced caching techniques, may be suitable for many customers experiencing performance-related issues. As a result they are trying to figure out when to tell a customer to use wide striping or enhanced caching vs. when to use SSD. The other issue is that as most of the traditional storage manufacturers get into the space they are introducing a Flash-based SSD and in many cases are integrating it into their existing storage systems.

While Flash-based SSD is acceptable for read-heavy environments, there remains concern about reliability and the random write I/O performance, while still better than mechanical drives, may not be worth the added costs. Also by integrating Flash-based SSD into the standard storage shelves, these suppliers are exposing themselves to shelf bottleneck issues.

Shelf bottleneck issues occur because in many cases two or three flash drives can consume all the bandwidth that the current drive shelf is able to deliver, leaving 10-plus drive slots unused. Many vendors will quickly mention that these open drive slots could be used by SATA or Fiber mechanical drives, but then you may get in to speed-matching issues.

In the end, storage manufacturers will likely have to come out with specific shelves for just SSD. Probably a 1U case that only holds four SSD drives or a larger standalone system that's designed just for SSD, like those from Solid Data Systems, Texas Memory Systems, or Violin Memory. These manufacturers also provide DRAM-based SSD, which does not suffer from the write I/O or reliability concerns with Flash.

Flash is not all bad and there are some excellent uses for it, as we will discuss in our next entry.

Join us for our upcoming Webcast: Demystifying Primary Storage Data Reduction.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.