Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

9/27/2008
02:26 PM
George Crump
George Crump
Commentary
50%
50%

Archive Needs To Succeed For SSD To Dominate

In my last entry I wrote that speed is solid state disk's "killer app," but for SSD to really become the primary storage mechanism in tier one, the archive tier needs to be fully established.

In my last entry I wrote that speed is solid state disk's "killer app," but for SSD to really become the primary storage mechanism in tier one, the archive tier needs to be fully established.With a full-functioning archive tier in place, SSD-based primary storage doesn't need to become less expensive than hard drive-based primary storage. SSD does need to narrow the price gap that there is today (and it will), but it doesn't need to become cheaper. But what is a functioning archive tier?

The current use of archive, assuming you really have a separate archive storage platform (backups don't count), will migrate stale data after a year or two of inactivity. The future archive tier will very aggressively move data in and out of the primary tier in a matter of days of becoming inactive. Primary storage will almost be a very large cache.

We have the foundations for a functioning archive tier in place today. There are great disk-archiving hardware platforms like those from Copan Systems, Permabit, and Nexsan. These platforms provide reasonably quick access to stale data while offering massive scale and retention capabilities. The ability to move data to these platforms is improving through products that offer a Global File System solution like OnStor that has integrated into the NAS head, or standalone products like EMC's Rainfinity or Attune Systems. The data movement utility software is improving as well, such as those from Atempo and Enigma Data. Finally, intelligent storage controllers like those from Compellent or 3PAR can move data at a block level with no user intervention.

If the components of the solution are all there, why have we not seen adoption in the archive tier? First, I think there is the perception that simply expanding tier one is easier than integrating an archive tier. In actuality, growing tier one is quite complex and expensive. Also, I think the aggressive server virtualization rollouts have hurt the development of an archive tier. By having IT personnel so focused on server virtualization deployment, they've had little time to tend to data management projects. Last, there needs to be continuing improvement in the above archive components to simplify the implementation process as well as further automate the migration process.

That said, taking the time today to develop an archive tier will have immediate cost and power savings as well as longer-term preparedness for retention and the eventual move to a SSD-based primary storage. The companies that can implement a SSD-based primary storage strategy first will have a significant competitive advantage.

For more on cloud storage, sign up for our Webcast Sept. 29: Cloud Storage 101.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/2/2020
Ripple20 Threatens Increasingly Connected Medical Devices
Kelly Sheridan, Staff Editor, Dark Reading,  6/30/2020
DDoS Attacks Jump 542% from Q4 2019 to Q1 2020
Dark Reading Staff 6/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-9498
PUBLISHED: 2020-07-02
Apache Guacamole 1.1.0 and older may mishandle pointers involved inprocessing data received via RDP static virtual channels. If a userconnects to a malicious or compromised RDP server, a series ofspecially-crafted PDUs could result in memory corruption, possiblyallowing arbitrary code to be executed...
CVE-2020-3282
PUBLISHED: 2020-07-02
A vulnerability in the web-based management interface of Cisco Unified Communications Manager, Cisco Unified Communications Manager Session Management Edition, Cisco Unified Communications Manager IM & Presence Service, and Cisco Unity Connection could allow an unauthenticated, remote attack...
CVE-2020-5909
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, when users run the command displayed in NGINX Controller user interface (UI) to fetch the agent installer, the server TLS certificate is not verified.
CVE-2020-5910
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the Neural Autonomic Transport System (NATS) messaging services in use by the NGINX Controller do not require any form of authentication, so any successful connection would be authorized.
CVE-2020-5911
PUBLISHED: 2020-07-02
In versions 3.0.0-3.5.0, 2.0.0-2.9.0, and 1.0.1, the NGINX Controller installer starts the download of Kubernetes packages from an HTTP URL On Debian/Ubuntu system.