News
4/4/2011
02:37 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

The Passive Primary Storage Tier

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary stora

Primary storage, especially the storage that supports file based data, is challenging to deal with. In most environments file based data, data created by office productivity and rich media applications can number in the double digit TB's, can bring backup applications to a crawl and cause countless retention issues. The challenge is that 80% or more of this data had an active life span of a month but can't be deleted "just in case". What is needed is to create a passive tier of primary storage.The ability to automatically move data between tiers of storage is now built into file systems and storage controllers. Moving data to a slower less expensive tier is nothing new. The problem is that even these cheaper, more power efficient tiers of storage are not deserving of data that basically was useful for a month and is only being held on to "just in case" or to meet some legal requirement. This data needs to be identified and moved out of the active primary storage environment so that backup systems and IT budgets have to account for them. The best location for this passive primary tier of storage may actually be tape...Wait, let me explain.

Remember this is data that was active for a short period of time but needs to be retained for one reason or another. Chances are extremely high that most of it will never be accessed again but chances are that some, maybe 1% of it might be, so you just can't delete it and you will need to be able to find some of it. That means that the data does not have to be made available instantly, the moment it is decided that it is needed again, but it does need to be instantly searchable and the retrieval needs to occur within a few minutes.

Modern tape is ideal for this use case. Tape has improved in its reliability, its performance and increased its lead in cost for capacity. Most tape libraries can select a tape cartridge, load it and position it to the right location in less than a minute. With tape we can get the data back and as we indicated in a recent briefing note, tape library vendors are adding off-line verification capabilities. The only missing component then is finding that data. The simplest solution for that is to never lose it or in the case of a file system make it look like it is still online.

Several file systems exist today that can combine disk and tape into a single entity that the users interact with as if it were any other file system. As files are first created and saved they are first stored on high speed storage, then as they age they are migrated off to slower storage, maybe a MAID device and then to a tape tier. With the performance of tape being what it is now, it could be possible to eliminate that middle tier. It depends on your comfort level.

You may be wondering if I just snuck an HSM (hierarchical storage management) or ILM (Integrated lifecycle management) design in on you here. To some extent I did. The difference is the level of integration that these file systems can perform and how seamless the movement back and forth between disk and tape is. The other difference is how early in the process you can move to tape now. In the past tape was the place to put data after it was really, really old. Now given its performance you may want to consider it the moment it becomes inactive.

The tape market is so vibrant that it now has its own event, "The Tape Summit", in which tape leaders will gather to further detail these architectures to advance tape's role in the enterprise. The goal is important not only to the tape suppliers but also to you the users. If the negatives that surround tape can be overcome and the clear economic advantages of tape be widened your capacity acquisition costs will go down and power efficiency will go up.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
10 Recommendations for Outsourcing Security
10 Recommendations for Outsourcing Security
Enterprises today have a wide range of third-party options to help improve their defenses, including MSSPs, auditing and penetration testing, and DDoS protection. But are there situations in which a service provider might actually increase risk?
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.