Feeds

Amazon marries MapReduce with VM auctions

Bid for Big Data crunches

High performance access to file storage

Structure Amazon has announced that you can now use its data-crunching Elastic MapReduce service in tandem with EC2 Spot Instances, unused EC2 virtual machines that company puts up for open auction. Spot instance prices fluctuate according to supply and demand, but these VMs can typically be used for less than the standard instance price.

Amazon chief technology officer Werner Vogels announced the marriage of Elastic MapReduce and Spot Instances Wednesday morning at the GigaOm Structure conference in downtown San Francisco, California. Introduced in the spring of 2009, Amazon's Elastic MapReduce is essentially the open source Hadoop MapReduce platform running atop Amazon EC2, a service that provides access to readily scalable processing power. Based on Google's proprietary MapReduce platform, Hadoop is a means of splitting data into tiny pieces and crunching it across many distributed machines.

Werner Vogels

Vogels talks Spot Instances

In 2004, Google published a paper describing its proprietary MapReduce framework, and shortly thereafter, Nutch crawler founder Doug Cutting launched an open-source project based on Google's platform and its proprietary Google File System (GFS). He called it Hadoop after his son's stuffed elephant.

Amazon introduced Spot Instances at the end of 2009, and according to Vogel, they have been widely used by enterprises building what he calls increasingly "sophisticated" applications atop EC2. "[Spot Instances] have been very very successful in allowing application architects to think differently about the price they're willing to pay for a certain unit of work in a certain amount of time." Over the past few months, Vogels said, the combination of Elastic MapReduce and Spot Instances was one of the most requested updates to Amazon Web Services, the company's overarching collections of cloud services.

According to Vogels, you can run your MapReduce applications entirely on Spot instances, but you can spread it across other Amazon services as well.

Amazon is the most widely used of the public infrastructure cloud services, though it's unclear just how widely used it is. Vogels did say that each day, EC2 "infrastructure cloud" is spinning up enough virtual machines to run the equivalent of the Amazon's entire online retail operation circa 2000, when Amazon was a $2.78bn business. Its S3 storage service is now hosting nearly 339 billion objects, more than twice as many objects as it was storing last year.®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.