Feeds

Compute-storage mashup: Great for Big Data, but what of my mobile?

Latency HELL as 'tops and 'slabs probe cloud

3 Big data security analytics techniques

Blocks and Files Should compute and storage dance closer together or farther apart?

In the enterprise there is a strengthening under-current of thought that says data access latency is bad. You shouldn't have to wait for data. In the networked storage array field that is causing the import of flash storage into arrays to kick disk seeks into the long grass, and the provision of higher-speed networking, such as InfiniBand and 1Gbit/s Fibre Channel. But that's just tinkering with network latency.

We're seeing flattening SANs and virtualised server area networkers using server IO virtualisation, like the Oracle Xsigo technology, to provide SAN data access facilities at direct-attached storage (DAS) speeds. The purest exhibition of this is to re-invent DAS as flash storage memory, treated as an adjunct to a server's RAM accessed through the memory IO subsystem and not the disk IO subsystem.

These are examples of bringing storage to compute. A reverse trend is also visible though not as readily apparent, and that is bringing compute to storage by running application software inside storage arrays, as EMC keeps on saying its going to do with VMAX, VNX and Isilon storage arrays. DataDirect Networks is actually doing it by running file systems such as GPFS and Lustre inside its storage arrays via the ExaScaler and Gridscaler products. These are system-level applications though and not end-user apps. Running actual end-user apps in storage arrays is still a distant prospect.

In client, end-point computing-land the reverse is happening; to a large extent compute and storage are getting further apart. The smart end-points, like mobile phones, tablets, Google-ised Chromebooks and virtualised desktops have very little local storage and the cloud or enterprise data centre is where the data is stored. Like Big Data, client data is centripetal. Why is network latency acceptable for end-points but not in servers?

Frankly, sitting at the end of what my ISP or mobile phone service provider laughably calls broadband, having the remote servers access their data at microsecond speeds instead of milliseconds while I'm waiting multiple seconds leaves me cold. I could care less. I want my data - right now. If low latency is good for data centre servers then it's good for client devices too. But no shared network, no affordable shared network, is ever going to be as fast as local storage, or as dependable, as those who suffer ISP link outages know only too well.

Put another way: Big Data is a data centre thing. Here out in the far-flung reaches, the outer galactic spiral arms of end-point computing, Big Data doesn't exist. It's a case of little or no data. Curious isn't it? Latency sauce for the data centre server goose is not latency sauce for the end-point gander. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.