Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


11:17 AM
George Crump
George Crump

DeDupe Team Up

There is a growing trend in storage lately, the concept of a manufacturer tapping another developer to help them compete in the market. This allows two smaller suppliers to team up against the larger suppliers. One of the best examples of this is NAS vendors adding deduplication functionality to their systems.

There is a growing trend in storage lately, the concept of a manufacturer tapping another developer to help them compete in the market. This allows two smaller suppliers to team up against the larger suppliers. One of the best examples of this is NAS vendors adding deduplication functionality to their systems.NetApp is having success with its deduplication capabilities and the competing NAS suppliers are often tapping another supplier to help them compete. NAS suppliers like BlueArc, Isilon and HP are partnering with Ocarina Networks and others to be able to deliver deduplication capabilities to their storage systems. It also allows these smaller suppliers to specialize on what they do best and not waste a lot of development cycles on adding a feature that is already available somewhere else.

These vendors can deliver value right out of the box just by having the relationship. For example Isilon can leverage the Ocarina Technology to be able to migrate and optimize data between their primary storage S and X class systems to their NL systems, with no additional development required by either supplier. Over time each of these vendors will take advantage of the relationship and build a level of integration that will highlight their NAS specific features.

BlueArc for example has integrated the capability into their data migration facility to allow for transparent and optimized migrations to less expensive storage tiers that are seamless to the user. This transparency is critical and allows administrators to be more aggressive in migration since, from a user perspective, there is limited if any, noticeable performance loss on a migrated file. The optimization of the migration process as we detail in our article "Optimized Migrations" further increases the ROI of the secondary storage tier.

It appears that NetApp has an advantage against these competitors in that they can deduplicate active data like VMware images but you have to be careful when using that capability to make sure the workloads will not see a performance impact. Specifically you are advised to avoid deduplicating databases and any write heavy workload.

These competitors also have an advantage in that their option can also compress data as well as deduplicate it. In many scenarios there is not much duplicate data but much of the data is compressible. To achieve meaningful deduplication rates requires that there be some duplicate data, compression works on all the data that is compressible regardless of how much duplicate data there is.

Following this through compression of active data, including databases via a real time appliance like those offered by Storwize may be the most logical solution and could very well compliment and enhance the overall storage optimization strategy.

There are many options available for optimizing the storage capacity of file system data and it is available from a variety of sources. Make sure you consider all the options available to you and include compression as well as deduplication into the decision criteria.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Threaded  |  Newest First  |  Oldest First
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-05-06
Unconstrained Web access to the device's private encryption key in the QR code pairing mode in the eWeLink mobile application (through 4.9.2 on Android and through 4.9.1 on iOS) allows a physically proximate attacker to eavesdrop on Wi-Fi credentials and other sensitive information by monitoring the...
PUBLISHED: 2021-05-06
A security vulnerability has been identified in the HPE Edgeline Infrastructure Manager, also known as HPE Edgeline Infrastructure Management Software, prior to version 1.22. The vulnerability could be remotely exploited to bypass remote authentication leading to execution of arbitrary commands, gai...
PUBLISHED: 2021-05-06
emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php.
PUBLISHED: 2021-05-06
** UNSUPPORTED WHEN ASSIGNED ** The 'id' parameter of IBM Tivoli Storage Manager Version 5 Release 2 (Command Line Administrative Interface, dsmadmc.exe) is vulnerable to an exploitable stack buffer overflow. Note: the vulnerability can be exploited when it is used in "interactive" mode wh...
PUBLISHED: 2021-05-06
Stormshield SNS with versions before 3.7.18, 3.11.6 and 4.1.6 has a memory-management defect in the SNMP plugin that can lead to excessive consumption of memory and CPU resources, and possibly a denial of service.