Feeds

Cleversafe beats RAID/replication scale trap

Distributed slices of data

High performance access to file storage

Cleversafe has improved the hardware it sells to distribute slices of data around a network, reckoning this is much cheaper at the PB scale than a RAID and replication combination.

RAID 5 will protect a drive failure. RAID 6 will proptect against a double drive failure. So if a second drive fails while a rebuild is recovering from a first drive failure you can still recover data, albeit with much more storage overhead. As the number and size of disk drives in an enterprise increases the statistical likelihood of a third drive failure while a rebuild is in operation increases, meaning a greater overhead RAID scheme will need to be devised.

IT departments replicate data from one data centre to another to help ensure data is safe if an entire data centre goes down. This means multiple copies of data, overhead which is added to the RAID overhead and uses up more storage capacity.

Cleversafe's dsNet technology ingests data and cuts it up into thousands of slices that are distributed across nodes, Slicestors, in its network. It claims six out of 16 Slicestors can fail and data will still be accessible. The storage overhead is said to be much less than with a generic RAID plus replication arrangement.

There are new Slicestor Storage Servers. The 2100 is a 1U/8TB box with the 2200 being a 2U/24TB one. Accesser appliances ingest data and cut it up into slices, sending them to the Slicestors. The Accessor 2100 has 10GbitE connectivity and uses flash memory to speed O/S operations.

These components are combined in a new turnkey product, the dsNet Cabinet 2200, which has 18 Slicestors, two Accesser appliances, a dsNet Manager Appliance, a 48-port multi-layer Ethernet switch, Omnience management software, and 432TB of raw storage.

Cleversafe says its kit is best used for storing nearline and archive data and can scale from terabytes to petabytes. It is for customers looking to store various content types, such as unstructured files, media, large objects and sensitive information, in private and public cloud deployments with virtually limitless amounts of data.

This market is also the one addressed by IBM's SONAS, Hitachi Data Systems Content Archive Platform, NEC's HYDRAstor Permabit and others.

Cleversafe CEO Chris Gladwin says: "We can deliver on making data always available, bit-perfect, and reliable over its lifetime.” Other suppliers will say the same thing, and customer choices will come down to brand, economics, functionality and reliability. Gladwin reckons Cleversafe has the lead on the storage economics front. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.