Feeds

Using Hadoop for data on Google's cloud? Google would rather you didn't

And it's got just the replacement for it: a shiny 'Google Cloud Storage Service'

Internet Security Threat Report 2014

Google wants to shift heavy users of its cloud services away from an open-source, community-developed filesystem and into its own proprietary Colossus tech.

The upgrade was announced by the web overlord in a blog post on Tuesday that announced admins could now store Hadoop-destined data directly in Google's closed-sourced Colossus-based "Google Cloud Storage Service", and threw mud at the traditional Hadoop File System (HDFS) plugin.

The service, we're told, provides a more efficient connector between Google's cloud storage and compute services, and represents another advance in the Chocolate Factory's rent-a-server infrastructure which competes with Amazon Web Services and Windows Azure.

Hadoop is an open-source data analysis platform based on ideas outlined in the Google File System and Map Reduce papers which came out of Google in the early 2000s.

Since Hadoop's genesis at Yahoo! in the 2000s it has become a standard component of any data analyst's open-source toolkit, and its development is stewarded by companies including Cloudera and Hortonworks.

Google, though, would prefer it if users of its cloud opted for the closed-source Colossus-based Google Cloud Storage. To tempt them over to the system, it has listed some of the benefits of using Colossus over HDFS. These benefits, according to Google, include "no storage management overhead", "high data availability", and "quick start up."

Colossus has multiple master nodes which gets around some of the redundancy problems that bedevil early HDFS implementations. It also uses Reed-Solomon erasure codes to perform error correction which, Google says, "achieve similar resilience to failures compared to replication, though with less storage overhead."

Developers should bear in mind that using the cloud storage service locks them further into Google's own idiosyncratic way of doing things and pushes them further away from the main filesystem of the open-source large-scale data community. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.