Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

9/24/2009
09:11 AM
George Crump
George Crump
Commentary
50%
50%

Implementing Power Efficient Drives

Most green storage methods really allow you to store more data in the same physical space, for the same amount of power consumption. To get serious about power efficiency you have to be able to turn things off. The ideal way to do this is have the drives either spin down or turn them off, but there is limited information about implementing power efficient drives.

Most green storage methods really allow you to store more data in the same physical space, for the same amount of power consumption. To get serious about power efficiency you have to be able to turn things off. The ideal way to do this is have the drives either spin down or turn them off, but there is limited information about implementing power efficient drives.Major drive manufacturers have announced power efficient drives for enterprise systems that are now being integrated into those storage systems. In addition certain storage systems manufacturers like Nexsan and Copan Systems have gone further to offer greater granularity and user control over power efficient storage.

The technology is relatively simple. After a period of inactivity the drives in an array slow down and are then put into a mode where they stop spinning altogether. Each of these modes have an increase in power savings but with them comes additional delay in response time. The delay can range from sub-second to a few seconds. Drive and array vendors will offer different levels of power savings. Nexsan for example has levels ranging from unloading the heads, to slowing the RPMs of the drive down, to putting the drives into a sleep mode.

For the benefits of power efficient drives to be realized they must be allowed to not be accessed long enough for the spin down technologies to engage. That means your data needs to be organized in such a way that your very active data set is not sharing a LUN with the potentially inactive data set. This can be particularly difficult to design if you are creating a LUN with drives from separate shelves.

If you are using a multi-shelf system and want to mix drive types, make sure your vendor supports it and be aware that the only power efficiency you will derive is on those drives. The shelf itself will need to continue to run at full power. Single shelf systems or systems that only provide power efficient storage are easier to manage and with today's available drive capacities offer considerable scalability.

Designing a separate LUN or LUNs to receive mostly idle data is the first step. The next is to analyze that data and find data that is infrequently accessed and then to group that data together. This can be done with tools like those offered by Tek-Tools or APTARE. Folders can be monitored for access frequency, those that aren't accessed daily are ideal candidates to move to the power efficient LUN. Another technique that we discuss in our article "Archiving in Place" is to, when purchasing a new array, route newly created data to that array and let the older array idle off as access to it becomes less frequent.

Power efficiency is not just for really old data that has not been accessed in the last six months. It is for data that is being accessed infrequently, every other day for example. It should even be considered for data that is not being accessed overnight, user home directories as another example. While we often talk about archive data being about 80% of the data in the environment, infrequent data may be as much as 99% of the data in the enterprise. Imagine the power savings if 99% of your data was on power efficient storage.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Zero-Factor Authentication: Owning Our Data
Nick Selby, Chief Security Officer at Paxos Trust Company,  2/19/2020
44% of Security Threats Start in the Cloud
Kelly Sheridan, Staff Editor, Dark Reading,  2/19/2020
Firms Improve Threat Detection but Face Increasingly Disruptive Attacks
Robert Lemos, Contributing Writer,  2/20/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
6 Emerging Cyber Threats That Enterprises Face in 2020
This Tech Digest gives an in-depth look at six emerging cyber threats that enterprises could face in 2020. Download your copy today!
Flash Poll
How Enterprises Are Developing and Maintaining Secure Applications
How Enterprises Are Developing and Maintaining Secure Applications
The concept of application security is well known, but application security testing and remediation processes remain unbalanced. Most organizations are confident in their approach to AppSec, although others seem to have no approach at all. Read this report to find out more.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8813
PUBLISHED: 2020-02-22
graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie, if a guest user has the graph real-time privilege.
CVE-2020-9039
PUBLISHED: 2020-02-22
Couchbase Server 4.x and 5.x before 6.0.0 has Insecure Permissions for the projector and indexer REST endpoints (they allow unauthenticated access).
CVE-2020-8860
PUBLISHED: 2020-02-22
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Samsung Galaxy S10 Firmware G973FXXS3ASJA, O(8.x), P(9.0), Q(10.0) devices with Exynos chipsets. User interaction is required to exploit this vulnerability in that the target must answer a phone call. T...
CVE-2020-8861
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-1330 1.10B01 BETA Wi-Fi range extenders. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of HNAP login requests. The issue ...
CVE-2020-8862
PUBLISHED: 2020-02-22
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of D-Link DAP-2610 Firmware v2.01RC067 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of passwords. The issue results from the ...