Feeds

Permabit archives your bulk data

Very scalable. Very, very protected

Combat fraud and increase customer satisfaction

Filesystem and protection

Permabit has a global file system that can span across an entire grid, or customers can have separate file systems within each grid. What about spanning across grids? "We currently rely on third-party virtualisation solutions to provide the global view of our system, " Floyd said. "We are working on a future release that will span the file system across all grids...on integrating global file system technology into our product."

The idea is to make the use of Permabit's archival storage as transparent as possible to end users and applications. That would give the Nehalem processors something to chew on.

There is a RAID-EC protection scheme. How does this work? "It's actually RAIN (redundant array of independent nodes) rather than RAID. RAIN-EC leverages a patented erasure coding algorithm that allows for up to two simultaneous nodes failures, including any number of drives in these nodes. This is protection per grid, so multiple grids allows for multiple simultaneous failures in each grid."

What's the usable capacity of the 4010? "Each storage node has its 4TB of raw capacity," Floyd said. "A grid has a raw capacity of 144TB. Our combined data protection and file system overhead is approximately 35 per cent, but our technology incorporates deduplication. It is very typical for us to see over 4TB usable per storage node and 144TB usable per grid."

How about legal hold? "Permabit Enterprise Archive supports the ability to enforce retention of records on a file-by-file basis. Records are maintained in a non-modifiable, non-erasable manner for the time period specified by the administrator or application."

Floyd says there are more than 250 customers using Permabit archive products, some of them being cloud storage providers. "We see ourselves as an arms merchant to cloud storage - we can provide a stunningly low price with exceptional reliability upon which cloud service providers can build their services." A Permabit 4010 costs $250,000 for a 144TB configuration.

That's the Permabit pitch. Put the unstructured and semi-structured data that you have to keep into a purpose-built archive to keep it secure and protected for a better price per GB than anything else offering comparable facilities. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.