Feeds

Pillar juices Axiom software

Better protection and higher efficiency

Top 5 reasons to deploy VMware with Tegile

Pillar is adding four features to its Axiom software to make arrays protect data better and operate more efficiently.

It's adding its own array-based replication to extend its current FalconStor and InMage functions with policy-based Application-Aware profiles to replicate data asynchronously between Axiom arrays.

Pillar is also introducing the ability to monitor drives and detect ones that are likely to fail. Data on these drives is copied pre-emptively so that if and when they do fail the data rebuild is much faster. Pillar says it's been very careful to avoid false positives and having the array copy data off drives that are in fact healthy.

The Quality of Service (QoS) function in an Axiom works at the array level, across all storage tiers, and defines storage QoS levels for applications such that their data can be accessed and protected in defined ways. For example, sensitive data has higher protection levels. With the new software release, each storage media type (Fibre CHannel, solid state drive, SATA hard drive) can have all the QoS priority bands operational within a respective class for more granular use.

There are five tiers of storage and five QoS bands, forming a matrix.

Pillar says: "The QoS adjusts priority, CPU, cache and network resources - all extremely effective even with SSD in a storage pool. While statistical short stroking is one of the tools used to optimize SATA performance, it is only one tool used by the Axiom to extract every drop of performance from the capacity pool."

The fourth new function is application-aware QoS migration. This is the ability for administrators to directly control data movement within the array if they wish. Pillar says that relying utterly on automated tiering takes that control away from the administrators and restricts their ability to react to external events affecting the entire array, such as a service level agreement change or file status alteration.

An example might be an archived video that needs to be brought off long-term SATA storage and put in Fibre Channel or the solid state drive tier so that it can be re-rendered for fresh use. With app-aware QoS migration the administrators can do this without waiting for scanned data access patterns to detect higher activity and move blocks of data up the tiers more slowly than a single cross-tier migration operation.

The new software comes as an update for existing customers. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.