Feeds

IBM's tools give Big Data a good seeing to

Company shares nothing but Hadoop and GPFS

Reducing security risks from open source software

IBM is using Hadoop to make its General Parallel File System capable of dealing with Big Data - extremely large data sets - for cloud-based analytic computing.

Announced at the Supercomputing 2010 conference, the General Parallel File System-Shared Nothing Cluster (GPFS-SNC) project at IBM Research Almaden involves an architecture designed to provide higher availability through clustering technologies, dynamic file system management and replication.

GPFS is the basis for IBM's High Performance Computing Systems, Information Archive, Scale-Out NAS (SONAS), and Smart Business Compute Cloud. GPFS-SNC is a distributed, shared-nothing, computing architecture in which each node is self-sufficient; tasks are divided up between these independent computers and no one node waits on any other.

Hadoop, which is used by Yahoo!, has evolved from Google's MapReduce technology for computations involving petabyte-level data sets distributed across thousands of commodity hsrdware-based computational nodes. The Hadoop Distributed File System (HDFS) is a distributed, scalable and portable file system, written in Java, involving a cluster of data nodes.

HDFS is aware of the location, in a network switch sense, of servers (worker nodes) in the cluster and the system uses this to ensure they compute data local to them and thus reduce data traffic across the network. Different copies of data are kept on different sets of worker nodes, with data being replicated across nodes this way to avoid unnecessary redundancy and high availability, without RAID, should a worker node rack or network switch fail.

HDFS is not POSIX-compliant and one aspect of the GPFS-SNC project is to provide POSIX-compliance. GPFS on its own is POSIX-compliant.

IBM says running data analytics applications in the cloud on extremely large data sets is gaining traction because it is affordable and the underlying infrastructure can store and compute the immense amount of data involved. A POSIX interface means traditional applications using POSIX interfaces can use the cloud resources.

The end-user apps IBM has in mind are things like business intelligence, digital media processing and surveillance video searches. GPFS-SNC technology decomposes the large computation involved into a set of smaller parallelisable computations. IBM reckons GPFS-SNC can work around the frequent failures expected in large-scale commodity server and storage deployments, while being an efficient user of compute, storage and network resources.

IBM's announcement statement says GPFS-SNC "will convert terabytes of pure information into actionable insights twice as fast as previously possible... the design provides a common file system and namespace across disparate computing platforms, streamlining the process and reducing disk space."

The GPFS-SNC project is likely to be used in the EU-funded, IBM-led VISION cloud project announced in the beginning of November. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.