News
4/4/2011
02:37 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

The Passive Primary Storage Tier

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary stora

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary storage.The ability to automatically move data between tiers of storage is now built into file systems and storage controllers. Moving data to a slower less expensive tier is nothing new. The problem is that even these cheaper, more power efficient tiers of storage are not deserving of data that basically was useful for a month and is only being held on to "just in case" or to meet some legal requirement. This data needs to be identified and moved out of the active primary storage environment so that backup systems and IT budgets have to account for them. The best location for this passive primary tier of storage may actually be tape...Wait, let me explain.

Remember this is data that was active for a short period of time but needs to be retained for one reason or another. Chances are extremely high that most of it will never be accessed again but chances are that some, maybe 1% of it might be, so you just can't delete it and you will need to be able to find some of it. That means that the data does not have to be made available instantly, the moment it is decided that it is needed again, but it does need to be instantly searchable and the retrieval needs to occur within a few minutes.

Modern tape is ideal for this use case. Tape has improved in its reliability, its performance and increased its lead in cost for capacity. Most tape libraries can select a tape cartridge, load it and position it to the right location in less than a minute. With tape we can get the data back and as we indicated in a recent briefing note, tape library vendors are adding off-line verification capabilities. The only missing component then is finding that data. The simplest solution for that is to never lose it or in the case of a file system make it look like it is still online.

Several file systems exist today that can combine disk and tape into a single entity that the users interact with as if it were any other file system. As files are first created and saved they are first stored on high speed storage, then as they age they are migrated off to slower storage, maybe a MAID device and then to a tape tier. With the performance of tape being what it is now, it could be possible to eliminate that middle tier. It depends on your comfort level.

You may be wondering if I just snuck an HSM (hierarchical storage management) or ILM (Integrated lifecycle management) design in on you here. To some extent I did. The difference is the level of integration that these file systems can perform and how seamless the movement back and forth between disk and tape is. The other difference is how early in the process you can move to tape now. In the past tape was the place to put data after it was really, really old. Now given its performance you may want to consider it the moment it becomes inactive.

The tape market is so vibrant that it now has its own event, "The Tape Summit", in which tape leaders will gather to further detail these architectures to advance tape's role in the enterprise. The goal is important not only to the tape suppliers but also to you the users. If the negatives that surround tape can be overcome and the clear economic advantages of tape be widened your capacity acquisition costs will go down and power efficiency will go up.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0619
Published: 2014-10-23
Untrusted search path vulnerability in Hamster Free ZIP Archiver 2.0.1.7 allows local users to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the current working directory.

CVE-2014-2230
Published: 2014-10-23
Open redirect vulnerability in the header function in adclick.php in OpenX 2.8.10 and earlier allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the (1) dest parameter to adclick.php or (2) _maxdest parameter to ck.php.

CVE-2014-7281
Published: 2014-10-23
Cross-site request forgery (CSRF) vulnerability in Shenzhen Tenda Technology Tenda A32 Router with firmware 5.07.53_CN allows remote attackers to hijack the authentication of administrators for requests that reboot the device via a request to goform/SysToolReboot.

CVE-2014-7292
Published: 2014-10-23
Open redirect vulnerability in the Click-Through feature in Newtelligence dasBlog 2.1 (2.1.8102.813), 2.2 (2.2.8279.16125), and 2.3 (2.3.9074.18820) allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in the url parameter to ct.ashx.

CVE-2014-8071
Published: 2014-10-23
Multiple cross-site scripting (XSS) vulnerabilities in OpenMRS 2.1 Standalone Edition allow remote attackers to inject arbitrary web script or HTML via the (1) givenName, (2) familyName, (3) address1, or (4) address2 parameter to registrationapp/registerPatient.page; the (5) comment parameter to all...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.