Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

11/8/2010
10:39 AM
George Crump
George Crump
Commentary
50%
50%

How To Get High Performance Cloud Storage

One of the challenges with cloud storage is the connection between you and the storage. For almost everyone it is going to be slower than what is available within the data center. This performance difference does not mean a more limited use of cloud storage, it means that greater intelligence is needed to load data into the cloud. With that intelligence cloud storage could be leveraged for even the most demanding of applications.

One of the challenges with cloud storage is the connection between you and the storage. For almost everyone it is going to be slower than what is available within the data center. This performance difference does not mean a more limited use of cloud storage, it means that greater intelligence is needed to load data into the cloud. With that intelligence cloud storage could be leveraged for even the most demanding of applications.In almost all use cases, but especially cloud storage as part of a primary storage solution, it is going to require some sort of local presence to cache the active data sets. This local presence can come in the form of a stand alone appliance, a virtual appliance or can be integrated into the storage system itself. The goal of the local presence is to store the active data subset on local high speed storage and then as the data ages push it out to the cloud storage service but do so transparently.

This hybrid type of deployment does mean that the data set does have to be something that can be segregated by access dates. It also means that the ideal data set is one where it has a short create and edit cycle, then is rarely accessed in the future. A file server is an obvious example but messaging and group collaboration tools are as well.

No matter what the local data set is you are always going to need to copy data to the cloud. Most of these hybrid type of solutions will want to copy all new or modified data the moment that the change occurs, this provides a level of redundancy from a data protection perspective but means that the WAN bandwidth utilization is upfront as well. Most of these hybrid type of devices can trickle data to your cloud provider so bandwidth can be throttled back. More importantly most of them have some form of WAN optimization either compression or deduplication that reduces the data set before it is sent and after it lands. For example in the solution we are currently testing, while we have placed 77GB's of data in the cache device only 27GB's of that data has been actually transferred and stored thanks to compression and deduplication.

Even with this intelligent use of the available bandwidth there are some practical steps you will want to take. First you need to have a decent connection to the internet. When we began our testing we immediately found our connectivity to be a little lacking. We doubled our bandwidth for about 15% extra per month and it made the application significantly more usable.

Second you also want to select a data set that can be gradually migrated to the cloud, net new projects are ideal or data that can be easily isolated by age, migrating the oldest data sets one at a time. In our case if we used it for hosting our various projects and simply decided that all new projects would go on the cloud storage appliance. As a result we have seen almost no impact from having all of our data be on the cloud storage device and we have seen a performance improvement in local response time since our appliance is on high speed storage,

With these considerations in mind cloud storage can be a viable option for many applications and data sets. As the hybrid technology continues to improve and the cost of bandwidth continues to come down even more applications and data sets will be deemed cloud appropriate, but the time to develop a cloud storage strategy is now. We will be answering questions like this in more detail in tomorrow's live webinar "What's Your Cloud Strategy, Answering The Top Ten Questions".

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Zero Trust doesn't have to break your budget!
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32243
PUBLISHED: 2021-06-16
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).
CVE-2021-32244
PUBLISHED: 2021-06-16
Cross Site Scripting (XSS) in Moodle 3.10.3 allows remote attackers to execute arbitrary web script or HTML via the "Description" field.
CVE-2021-32245
PUBLISHED: 2021-06-16
In PageKit v1.0.18, a user can upload SVG files in the file upload portion of the CMS. These SVG files can contain malicious scripts. This file will be uploaded to the system and it will not be stripped or filtered. The user can create a link on the website pointing to "/storage/exp.svg" t...
CVE-2021-34201
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes.
CVE-2021-34203
PUBLISHED: 2021-06-16
D-Link DIR-2640-US 1.01B04 is vulnerable to Incorrect Access Control. Router ac2600 (dir-2640-us), when setting PPPoE, will start quagga process in the way of whole network monitoring, and this function uses the original default password and port. An attacker can easily use telnet to log in, modify ...