Feeds

EMC regains SPEC filer crown

I'd like to thank God, my parents, Isilon...

Beginner's guide to SSL certificates

EMC has regained the SPEC filer benchmark crown, and it took 3,220 disk drives to do it.

Isilon tested 28-, 56- and 140-node S200 systems, with the last gaining the SPECsfs2008 crown for both NFS and CIFS file access. Isilon scored 1,112,705 NFS operations - 75 per cent higher than the previous best-performing system, a Huawei Symantec N8500 which scored 636,036 NFS operations/second.

These are huge systems, the N8500 having 1,728 hard drives and 8 filesystems. EMC needed another 1,492, plus the 140 SSDs for metadata, to surpass that in its convincing fashion, and did it with a single filesystem.

Huawei Symantec had previously eclipsed an all-flash EMC VNX system that scored 497, 632 NFS operations in February, and we've gone from half a million NFS ops in the benchmark to a million in four months.

The S200 nodes had 6.9TB of 10K rpm SAS drive storage and a 200GB SSD for metadata storage.

EMC also wiped the floor with the CIFS version of the SPECsfs2008 benchmark, scoring 1,612,778 CIFS IOPS with the same benchmark setup. This is 126 per cent more than the 712,664 scored by a Huawei Symantec N8500 system, which had again pipped a VNX setup from EMC.

It's interesting that massive disk systems can outperform flash; pack enough spindles together and their parallel access is still a world-beater, but one wonders for how long?

We wait to see if Huawei Symantec can respond and beat EMC, or whether IBM can pull a SONAS hat out of the bag - perhaps a flash-enhanced one.

Another interesting point is the total absence of NetApp from these high-end SPECsfs2008 results. A FAS6080 scored 120,011 NFS ops with just 324 disk drives in August 2009. We suspect NetApp simply doesn't have a system with the sheer file operations/second grunt to match these EMC and Huawei Symantec systems.

Perhaps once it has its E Series systems sorted, the ones acquired by buying Engenio from LSI, NetApp might make a better showing. At the moment scale-out NAS rules in the big data levels of SPECsfs2008-land and NetApp isn't a player. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Cray-cray Met Office spaffs £97m on VERY AVERAGE HPC box
Only 250th most powerful in the world? Bring back Michael Fish
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
Cisco and friends chase WiFi's searing speeds with new cable standard
Cat 5e and Cat 6 are bottlenecks for WLAN access points
CAGE MATCH: Microsoft, Dell open co-located bit barns in Oz
Whole new species of XaaS spawning in the antipodes
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.