Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

12/8/2010
12:36 PM
George Crump
George Crump
Commentary
50%
50%

Why 2010 Will Make 2011 The Year Of SSD

In technology we are always looking for next year to be the year of something. Reality is that most technologies don't establish themselves in a single year, but 2011 could be the year that solid state storage makes significant inroads into the enterprise data center and that work will be because of what was done in 2010.

In technology we are always looking for next year to be the year of something. Reality is that most technologies don't establish themselves in a single year, but 2011 could be the year that solid state storage makes significant inroads into the enterprise data center and that work will be because of what was done in 2010.As we discussed in our recent webcast "The State of Solid State Disk", the first big step in 2010 was to provide storage managers with multiple ways to integrate the technology. In 2009 vendors basically threw the technology out there and let users try to figure out how to integrate it. In 2010 there was a better understanding of how to leverage operating system features like preferred mirrors or live volume migration to be able to move data to solid state disk. Also in 2010 we saw many vendors come out with a sub-volume data migration capability that could move data into the faster tier of storage as needed. We also saw caching products begin to mature that provided a broad use case for solid state storage with minimal disruption for the storage environment. Integrating solid state storage is no longer a "how to" question, it is more of a "which method is best" question. In 2011 we will start to discuss in which situation each these methods is best.

The other important solid state storage happening in 2010 was beginning to understand where each of the forms of solid state disk are most applicable in the environment. The classic solid state disk, soild state storage in the form of a drive, is establishing itself as a solid choice for single servers and as a bridging technology for current arrays. PCIe based solid state storage makes an excellent RAM memory alternative for systems that have maxed out their DRAM, they could also make an interesting internal option for storage systems. Putting an PCIe based SSD directly into the storage engine of today's systems could yield some interesting results. Many storage systems are now sophisticated storage software running on industry standard servers, so plugging in a PCIe SSD card into them could be easily integrated.

The final category is the densely packed solid state storage systems that we describe in our recent article, "What is a Memory Array". These systems gain the advantage of putting solid state storage in a memory module to pack more capacity in the least amount of space. Since a memory based storage system can be less concerned about heat and vibration the per rack densities can be significantly higher. Not only does this reduce cost it increases reliability since there is more available memory to be able to perform garbage collection and other functions.

One of the biggest gains in 2010 is the improvement in reliability. For the enterprise one of the biggest concerns with solid state storage has been how reliable is it? In our next entry we will look at the work done in 2010 to ease the reliability concerns of the technology.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Inside the Ransomware Campaigns Targeting Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/2/2021
Commentary
Beyond MITRE ATT&CK: The Case for a New Cyber Kill Chain
Rik Turner, Principal Analyst, Infrastructure Solutions, Omdia,  3/30/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3493
PUBLISHED: 2021-04-17
The overlayfs implementation in the linux kernel did not properly validate with respect to user namespaces the setting of file capabilities on files in an underlying file system. Due to the combination of unprivileged user namespaces along with a patch carried in the Ubuntu kernel to allow unprivile...
CVE-2021-3492
PUBLISHED: 2021-04-17
Shiftfs, an out-of-tree stacking file system included in Ubuntu Linux kernels, did not properly handle faults occurring during copy_from_user() correctly. These could lead to either a double-free situation or memory not being freed at all. An attacker could use this to cause a denial of service (ker...
CVE-2020-2509
PUBLISHED: 2021-04-17
A command injection vulnerability has been reported to affect QTS and QuTS hero. If exploited, this vulnerability allows attackers to execute arbitrary commands in a compromised application. We have already fixed this vulnerability in the following versions: QTS 4.5.2.1566 Build 20210202 and later Q...
CVE-2020-36195
PUBLISHED: 2021-04-17
An SQL injection vulnerability has been reported to affect QNAP NAS running Multimedia Console or the Media Streaming add-on. If exploited, the vulnerability allows remote attackers to obtain application information. QNAP has already fixed this vulnerability in the following versions of Multimedia C...
CVE-2021-29445
PUBLISHED: 2021-04-16
jose-node-esm-runtime is an npm package which provides a number of cryptographic functions. In versions prior to 3.11.4 the AES_CBC_HMAC_SHA2 Algorithm (A128CBC-HS256, A192CBC-HS384, A256CBC-HS512) decryption would always execute both HMAC tag verification and CBC decryption, if either failed `JWEDe...