Feeds

Using Hadoop for data on Google's cloud? Google would rather you didn't

And it's got just the replacement for it: a shiny 'Google Cloud Storage Service'

Choosing a cloud hosting partner with confidence

Google wants to shift heavy users of its cloud services away from an open-source, community-developed filesystem and into its own proprietary Colossus tech.

The upgrade was announced by the web overlord in a blog post on Tuesday that announced admins could now store Hadoop-destined data directly in Google's closed-sourced Colossus-based "Google Cloud Storage Service", and threw mud at the traditional Hadoop File System (HDFS) plugin.

The service, we're told, provides a more efficient connector between Google's cloud storage and compute services, and represents another advance in the Chocolate Factory's rent-a-server infrastructure which competes with Amazon Web Services and Windows Azure.

Hadoop is an open-source data analysis platform based on ideas outlined in the Google File System and Map Reduce papers which came out of Google in the early 2000s.

Since Hadoop's genesis at Yahoo! in the 2000s it has become a standard component of any data analyst's open-source toolkit, and its development is stewarded by companies including Cloudera and Hortonworks.

Google, though, would prefer it if users of its cloud opted for the closed-source Colossus-based Google Cloud Storage. To tempt them over to the system, it has listed some of the benefits of using Colossus over HDFS. These benefits, according to Google, include "no storage management overhead", "high data availability", and "quick start up."

Colossus has multiple master nodes which gets around some of the redundancy problems that bedevil early HDFS implementations. It also uses Reed-Solomon erasure codes to perform error correction which, Google says, "achieve similar resilience to failures compared to replication, though with less storage overhead."

Developers should bear in mind that using the cloud storage service locks them further into Google's own idiosyncratic way of doing things and pushes them further away from the main filesystem of the open-source large-scale data community. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.