Feeds

Permabit archives your bulk data

Very scalable. Very, very protected

7 Elements of Radically Simple OS Migration

Filesystem and protection

Permabit has a global file system that can span across an entire grid, or customers can have separate file systems within each grid. What about spanning across grids? "We currently rely on third-party virtualisation solutions to provide the global view of our system, " Floyd said. "We are working on a future release that will span the file system across all grids...on integrating global file system technology into our product."

The idea is to make the use of Permabit's archival storage as transparent as possible to end users and applications. That would give the Nehalem processors something to chew on.

There is a RAID-EC protection scheme. How does this work? "It's actually RAIN (redundant array of independent nodes) rather than RAID. RAIN-EC leverages a patented erasure coding algorithm that allows for up to two simultaneous nodes failures, including any number of drives in these nodes. This is protection per grid, so multiple grids allows for multiple simultaneous failures in each grid."

What's the usable capacity of the 4010? "Each storage node has its 4TB of raw capacity," Floyd said. "A grid has a raw capacity of 144TB. Our combined data protection and file system overhead is approximately 35 per cent, but our technology incorporates deduplication. It is very typical for us to see over 4TB usable per storage node and 144TB usable per grid."

How about legal hold? "Permabit Enterprise Archive supports the ability to enforce retention of records on a file-by-file basis. Records are maintained in a non-modifiable, non-erasable manner for the time period specified by the administrator or application."

Floyd says there are more than 250 customers using Permabit archive products, some of them being cloud storage providers. "We see ourselves as an arms merchant to cloud storage - we can provide a stunningly low price with exceptional reliability upon which cloud service providers can build their services." A Permabit 4010 costs $250,000 for a 144TB configuration.

That's the Permabit pitch. Put the unstructured and semi-structured data that you have to keep into a purpose-built archive to keep it secure and protected for a better price per GB than anything else offering comparable facilities. ®

Best practices for enterprise data

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
VMware builds product executables on 50 Mac Minis
And goes to the Genius Bar for support
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
Microsoft says 'weird things' can happen during Windows Server 2003 migrations
Fix coming for bug that makes Kerberos croak when you run two domain controllers
Cisco says network virtualisation won't pay off everywhere
Another sign of strain in the Borg/VMware relationship?
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?