Feeds

Cleversafe beats RAID/replication scale trap

Distributed slices of data

Combat fraud and increase customer satisfaction

Cleversafe has improved the hardware it sells to distribute slices of data around a network, reckoning this is much cheaper at the PB scale than a RAID and replication combination.

RAID 5 will protect a drive failure. RAID 6 will proptect against a double drive failure. So if a second drive fails while a rebuild is recovering from a first drive failure you can still recover data, albeit with much more storage overhead. As the number and size of disk drives in an enterprise increases the statistical likelihood of a third drive failure while a rebuild is in operation increases, meaning a greater overhead RAID scheme will need to be devised.

IT departments replicate data from one data centre to another to help ensure data is safe if an entire data centre goes down. This means multiple copies of data, overhead which is added to the RAID overhead and uses up more storage capacity.

Cleversafe's dsNet technology ingests data and cuts it up into thousands of slices that are distributed across nodes, Slicestors, in its network. It claims six out of 16 Slicestors can fail and data will still be accessible. The storage overhead is said to be much less than with a generic RAID plus replication arrangement.

There are new Slicestor Storage Servers. The 2100 is a 1U/8TB box with the 2200 being a 2U/24TB one. Accesser appliances ingest data and cut it up into slices, sending them to the Slicestors. The Accessor 2100 has 10GbitE connectivity and uses flash memory to speed O/S operations.

These components are combined in a new turnkey product, the dsNet Cabinet 2200, which has 18 Slicestors, two Accesser appliances, a dsNet Manager Appliance, a 48-port multi-layer Ethernet switch, Omnience management software, and 432TB of raw storage.

Cleversafe says its kit is best used for storing nearline and archive data and can scale from terabytes to petabytes. It is for customers looking to store various content types, such as unstructured files, media, large objects and sensitive information, in private and public cloud deployments with virtually limitless amounts of data.

This market is also the one addressed by IBM's SONAS, Hitachi Data Systems Content Archive Platform, NEC's HYDRAstor Permabit and others.

Cleversafe CEO Chris Gladwin says: "We can deliver on making data always available, bit-perfect, and reliable over its lifetime.” Other suppliers will say the same thing, and customer choices will come down to brand, economics, functionality and reliability. Gladwin reckons Cleversafe has the lead on the storage economics front. ®

Combat fraud and increase customer satisfaction

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.