Feeds

Using Hadoop for data on Google's cloud? Google would rather you didn't

And it's got just the replacement for it: a shiny 'Google Cloud Storage Service'

HP ProLiant Gen8: Integrated lifecycle automation

Google wants to shift heavy users of its cloud services away from an open-source, community-developed filesystem and into its own proprietary Colossus tech.

The upgrade was announced by the web overlord in a blog post on Tuesday that announced admins could now store Hadoop-destined data directly in Google's closed-sourced Colossus-based "Google Cloud Storage Service", and threw mud at the traditional Hadoop File System (HDFS) plugin.

The service, we're told, provides a more efficient connector between Google's cloud storage and compute services, and represents another advance in the Chocolate Factory's rent-a-server infrastructure which competes with Amazon Web Services and Windows Azure.

Hadoop is an open-source data analysis platform based on ideas outlined in the Google File System and Map Reduce papers which came out of Google in the early 2000s.

Since Hadoop's genesis at Yahoo! in the 2000s it has become a standard component of any data analyst's open-source toolkit, and its development is stewarded by companies including Cloudera and Hortonworks.

Google, though, would prefer it if users of its cloud opted for the closed-source Colossus-based Google Cloud Storage. To tempt them over to the system, it has listed some of the benefits of using Colossus over HDFS. These benefits, according to Google, include "no storage management overhead", "high data availability", and "quick start up."

Colossus has multiple master nodes which gets around some of the redundancy problems that bedevil early HDFS implementations. It also uses Reed-Solomon erasure codes to perform error correction which, Google says, "achieve similar resilience to failures compared to replication, though with less storage overhead."

Developers should bear in mind that using the cloud storage service locks them further into Google's own idiosyncratic way of doing things and pushes them further away from the main filesystem of the open-source large-scale data community. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.