Feeds

Storage startup busts object location barrier

Scality's Ring cycle: One Ring to find them all

Combat fraud and increase customer satisfaction

Reliability, autonomy and replicas

Scality says every node constantly monitors a number of its peers, presumably the ones in its segment, and automatically rebalances replication and load among them to make the system self-healing if a node crashes. The same mechanism can be used to cope with nodes jointing the ring as it grows.

When an object is first loaded, the Accessor node involved may assign a storage class to it which can define the number of disk failures it can survive: one, two or more. That implies that for it to survive one disk failure, there need to be two copies and so on. The Ring manages the number of replicas requested for each object.

The Ring also produces reliable performance, roughly equivalent to a storage area network, although it would be interesting to see what happens with a 10,000-node ring (four hops) and a 100,000-node one (five hops).

Lecat said: "The number of nodes is theoretically infinite since complexity increases less than the number of nodes. We are very confident about 1,000 nodes, but we have not been able to access enough hardware yet to actually test 10,000."

The Ring dumps low activity data off to a second tier of storage and the data sent there is compressed and deduplicated.

Customers and funding

Cloud service providers use Scality's Ring to offer storage-as-a-service applications, such as email. These customers are European, Scality not being a Silicon Valley-based startup, and include Belgian broadband cable service provider Telenet; Host Europe, which offers cloud hosting; German cloud computing providers ScaleUp and Dunkel; and German web hoster intergenia.

Revenues from these companies explain the relatively low funding level of the June 2010 A-round, in which Scality received $5m funding in June from three French venture capital concerns. This followed on from seed financing of $1.3m in February, when the firm started by morphing out of Bizanga. After that, the firm sold a Mail Transfer Agent product to Cloudmark and looked for a new business to enter. Much of this seed finance came from Scality's employees.

Scality has partnered with CommVault and CommVault Simpana can now be provided in the country of operation by local cloud storage providers using the Scality RING platform, or on-site for customers wishing to deploy their own private clouds with the same technology from Scality. That gets over an issue of legal and social needs for cloud-held data to be stored in the country of origin.

So what do we have here? Scality is an unusual creation: a France-based startup with up-to-the-minute object storage technology that is actually in use by service providers, billing customers real money for using Scality's Ring. They could have decided to use Caringo, Atmos or Centera from EMC, CleverSafe, or HCP from HDS, but they went for Scality instead.

Maybe you should check out Scality's Ring technology too. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.