Feeds

Pillar juices Axiom software

Better protection and higher efficiency

High performance access to file storage

Pillar is adding four features to its Axiom software to make arrays protect data better and operate more efficiently.

It's adding its own array-based replication to extend its current FalconStor and InMage functions with policy-based Application-Aware profiles to replicate data asynchronously between Axiom arrays.

Pillar is also introducing the ability to monitor drives and detect ones that are likely to fail. Data on these drives is copied pre-emptively so that if and when they do fail the data rebuild is much faster. Pillar says it's been very careful to avoid false positives and having the array copy data off drives that are in fact healthy.

The Quality of Service (QoS) function in an Axiom works at the array level, across all storage tiers, and defines storage QoS levels for applications such that their data can be accessed and protected in defined ways. For example, sensitive data has higher protection levels. With the new software release, each storage media type (Fibre CHannel, solid state drive, SATA hard drive) can have all the QoS priority bands operational within a respective class for more granular use.

There are five tiers of storage and five QoS bands, forming a matrix.

Pillar says: "The QoS adjusts priority, CPU, cache and network resources - all extremely effective even with SSD in a storage pool. While statistical short stroking is one of the tools used to optimize SATA performance, it is only one tool used by the Axiom to extract every drop of performance from the capacity pool."

The fourth new function is application-aware QoS migration. This is the ability for administrators to directly control data movement within the array if they wish. Pillar says that relying utterly on automated tiering takes that control away from the administrators and restricts their ability to react to external events affecting the entire array, such as a service level agreement change or file status alteration.

An example might be an archived video that needs to be brought off long-term SATA storage and put in Fibre Channel or the solid state drive tier so that it can be re-rendered for fresh use. With app-aware QoS migration the administrators can do this without waiting for scanned data access patterns to detect higher activity and move blocks of data up the tiers more slowly than a single cross-tier migration operation.

The new software comes as an update for existing customers. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.