Feeds

The SANs of Mars

Imaging the Red Planet at 2GB a time

HP ProLiant Gen8: Integrated lifecycle automation

Networked storage has proved a boon for US scientists studying high-res images of Mars, which can have file sizes in excess of 2GB.

The US Geological Survey (USGS) is using a clustered storage system from Isilon IQ to store thousands of images from the Mars Reconnaissance Orbiter, currently circling the Red Planet.

Aboard MRO is HiRISE, the High Resolution Imaging Science Experiment, a project led by the University of Arizona. It includes a 50cm aperture telescope and 14 camera elements, which are combined to create a virtual 1.2 Gigapixel mono camera and a 240 Megapixel colour camera.

HiRISE is able to resolve down to one metre or less, according to its designers. Images typically cover an area of 6km by 12km, and many will be taken in stereoscopic pairs to provide more information about that area's topography. You can check out HiRISE images of Mars here.

"With the advances in photographic telescopes and aerial cameras, the digital images we are able to capture with HiRISE are unique in their incredibly high resolution and complexity," said Chris Bradshaw, a senior engineer with the USGS astrogeology research programme. He said only clustered storage can provide the scalability, capacity and performance that's needed when working with such huge image files.

The Isilon IQ gear has enabled the USGS team to consolidate all its HiRISE images, including both processed images and the original raw data, into one single global namespace and file system that provides access from both Windows and Unix systems, and also has snapshot capabilities for data protection.

There are reports that the image flow from HiRISE could dry up, however. According to a recent story on Nature.com, seven of the 14 camera elements are sending back spurious data and one of the four colour detectors has failed completely. This has only led to a two percent loss of signal so far, according to the mission team, but the problem could eventually hit all the detectors.

That won't leave the coast clear for Martians to emerge from hiding though - MRO has other instruments on board, and it is only one of several Earth spacecraft orbiting the planet, plus there are two rovers on the ground. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.