Feeds

Pillar juices Axiom software

Better protection and higher efficiency

Beginner's guide to SSL certificates

Pillar is adding four features to its Axiom software to make arrays protect data better and operate more efficiently.

It's adding its own array-based replication to extend its current FalconStor and InMage functions with policy-based Application-Aware profiles to replicate data asynchronously between Axiom arrays.

Pillar is also introducing the ability to monitor drives and detect ones that are likely to fail. Data on these drives is copied pre-emptively so that if and when they do fail the data rebuild is much faster. Pillar says it's been very careful to avoid false positives and having the array copy data off drives that are in fact healthy.

The Quality of Service (QoS) function in an Axiom works at the array level, across all storage tiers, and defines storage QoS levels for applications such that their data can be accessed and protected in defined ways. For example, sensitive data has higher protection levels. With the new software release, each storage media type (Fibre CHannel, solid state drive, SATA hard drive) can have all the QoS priority bands operational within a respective class for more granular use.

There are five tiers of storage and five QoS bands, forming a matrix.

Pillar says: "The QoS adjusts priority, CPU, cache and network resources - all extremely effective even with SSD in a storage pool. While statistical short stroking is one of the tools used to optimize SATA performance, it is only one tool used by the Axiom to extract every drop of performance from the capacity pool."

The fourth new function is application-aware QoS migration. This is the ability for administrators to directly control data movement within the array if they wish. Pillar says that relying utterly on automated tiering takes that control away from the administrators and restricts their ability to react to external events affecting the entire array, such as a service level agreement change or file status alteration.

An example might be an archived video that needs to be brought off long-term SATA storage and put in Fibre Channel or the solid state drive tier so that it can be re-rendered for fresh use. With app-aware QoS migration the administrators can do this without waiting for scanned data access patterns to detect higher activity and move blocks of data up the tiers more slowly than a single cross-tier migration operation.

The new software comes as an update for existing customers. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.