Feeds

Pillar juices Axiom software

Better protection and higher efficiency

Application security programs and practises

Pillar is adding four features to its Axiom software to make arrays protect data better and operate more efficiently.

It's adding its own array-based replication to extend its current FalconStor and InMage functions with policy-based Application-Aware profiles to replicate data asynchronously between Axiom arrays.

Pillar is also introducing the ability to monitor drives and detect ones that are likely to fail. Data on these drives is copied pre-emptively so that if and when they do fail the data rebuild is much faster. Pillar says it's been very careful to avoid false positives and having the array copy data off drives that are in fact healthy.

The Quality of Service (QoS) function in an Axiom works at the array level, across all storage tiers, and defines storage QoS levels for applications such that their data can be accessed and protected in defined ways. For example, sensitive data has higher protection levels. With the new software release, each storage media type (Fibre CHannel, solid state drive, SATA hard drive) can have all the QoS priority bands operational within a respective class for more granular use.

There are five tiers of storage and five QoS bands, forming a matrix.

Pillar says: "The QoS adjusts priority, CPU, cache and network resources - all extremely effective even with SSD in a storage pool. While statistical short stroking is one of the tools used to optimize SATA performance, it is only one tool used by the Axiom to extract every drop of performance from the capacity pool."

The fourth new function is application-aware QoS migration. This is the ability for administrators to directly control data movement within the array if they wish. Pillar says that relying utterly on automated tiering takes that control away from the administrators and restricts their ability to react to external events affecting the entire array, such as a service level agreement change or file status alteration.

An example might be an archived video that needs to be brought off long-term SATA storage and put in Fibre Channel or the solid state drive tier so that it can be re-rendered for fresh use. With app-aware QoS migration the administrators can do this without waiting for scanned data access patterns to detect higher activity and move blocks of data up the tiers more slowly than a single cross-tier migration operation.

The new software comes as an update for existing customers. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.