Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

9/27/2008
02:26 PM
George Crump
George Crump
Commentary
50%
50%

Archive Needs To Succeed For SSD To Dominate

In my last entry I wrote that speed is solid state disk's "killer app," but for SSD to really become the primary storage mechanism in tier one, the archive tier needs to be fully established.

In my last entry I wrote that speed is solid state disk's "killer app," but for SSD to really become the primary storage mechanism in tier one, the archive tier needs to be fully established.With a full-functioning archive tier in place, SSD-based primary storage doesn't need to become less expensive than hard drive-based primary storage. SSD does need to narrow the price gap that there is today (and it will), but it doesn't need to become cheaper. But what is a functioning archive tier?

The current use of archive, assuming you really have a separate archive storage platform (backups don't count), will migrate stale data after a year or two of inactivity. The future archive tier will very aggressively move data in and out of the primary tier in a matter of days of becoming inactive. Primary storage will almost be a very large cache.

We have the foundations for a functioning archive tier in place today. There are great disk-archiving hardware platforms like those from Copan Systems, Permabit, and Nexsan. These platforms provide reasonably quick access to stale data while offering massive scale and retention capabilities. The ability to move data to these platforms is improving through products that offer a Global File System solution like OnStor that has integrated into the NAS head, or standalone products like EMC's Rainfinity or Attune Systems. The data movement utility software is improving as well, such as those from Atempo and Enigma Data. Finally, intelligent storage controllers like those from Compellent or 3PAR can move data at a block level with no user intervention.

If the components of the solution are all there, why have we not seen adoption in the archive tier? First, I think there is the perception that simply expanding tier one is easier than integrating an archive tier. In actuality, growing tier one is quite complex and expensive. Also, I think the aggressive server virtualization rollouts have hurt the development of an archive tier. By having IT personnel so focused on server virtualization deployment, they've had little time to tend to data management projects. Last, there needs to be continuing improvement in the above archive components to simplify the implementation process as well as further automate the migration process.

That said, taking the time today to develop an archive tier will have immediate cost and power savings as well as longer-term preparedness for retention and the eventual move to a SSD-based primary storage. The companies that can implement a SSD-based primary storage strategy first will have a significant competitive advantage.

For more on cloud storage, sign up for our Webcast Sept. 29: Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Human Nature vs. AI: A False Dichotomy?
John McClurg, Sr. VP & CISO, BlackBerry,  11/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: -when I told you that our cyber-defense was from another age
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15073
PUBLISHED: 2019-11-20
An Open Redirect vulnerability for all browsers in MAIL2000 through version 6.0 and 7.0, which will redirect to a malicious site without authentication. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15072
PUBLISHED: 2019-11-20
The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.
CVE-2019-15071
PUBLISHED: 2019-11-20
The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail syste...
CVE-2019-6176
PUBLISHED: 2019-11-20
A potential vulnerability reported in ThinkPad USB-C Dock Firmware version 3.7.2 may allow a denial of service.
CVE-2019-6184
PUBLISHED: 2019-11-20
A potential vulnerability in the discontinued Customer Engagement Service (CCSDK) software version 2.0.21.1 may allow local privilege escalation.