Feeds

Caringo administers dose of CAStor oil

Constipated file systems need grunt and strain no more

Securing Web Applications Made Simple and Scalable

Caringo, founded by the Centera technology inventors, has reformulated its CAStor oil for the fifth time, adding named objects and more granular multi-tenancy.

Caringo was founded by the people who devised the FilePool technology which EMC bought and turned into its Centera product line. CAStor is a content-addressed storage (CAS) technology running, unlike Centera, on commodity X86 hardware nodes that are clustered and self-managing, and automatically check data integrity and provide replication-based, not RAID-based, protection. Dell is OEM'ing the technology in its DX6000 object storage platform.

The content sky is getting populated with more object storage products aiming to displace filesystem-based approaches to cloud storage on grounds of far more efficient object location than by running across a filesystem tree. As the number of objects scales to a billions and beyond file system approaches become more and more disadvantageous.

That's the story being put by Caringo, CleverSafe, HDS, and newcomer Scality, aiming to give filers an object lesson in cloud storage.

Version 5.0 of CAStor introduces user-named objects which scan be used alongside the system-provided Unique User IDs (UUID). These named objects are stored in abstractions called buckets, and buckets for each main user or tenant of a CAStor cloud are stored in domains. Security policies can be applied at domain, bucket or individual object level.

Caringo's named objects, buckets and domains can be thought of as being very loosely, equivalent to files, folders and filesystems layered onto an object storage base with the named object infrastructure operating in parallel with the object infrastructure using UUIDS for objects. The firm says named objects are suited for applications requiring a self-generated or symbolic name to store and retrieve a file or object.

Domains can be unique to a department, division or company and thus, like HDS' updated HCP enable a tenant's storage to be broken down into sub-tenancies. Caringo says Amazon's S3 can only have one domain per user (tenant) whereas CAStor can provide many.

CAStor v5.0 has the concept of caching high-activity objects in a node's DRAM. Where HCP uses HDI nodes to cache content in edge, on-ramp devices, CAStor 5 caches content across the content store cluster heart, and says its operation in this sense is akin to a content delivery network. As demand for an object changes, CAStor automatically manages the overall cache to increase or decrease the number of cached copies throughout the storage cluster.

Caringo says CAStor is a cloud storage system, deployable internally as a private cloud or by a service provider as a public cloud. Users access their data by a username/password combo and access control lists (ACLs), with this data held as a named object, and users given access to single or multiple objects only, up to buckets and domains.

The company hopes, no doubt, that its CAStor object storage will help file systems kick the bucket, in the cloud at any rate. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.