Feeds

Clueless over your heaps of unstructured data? You could soon whip out 'DIY tool'

El Reg looks into Data Gravity's new work

Top 5 reasons to deploy VMware with Tegile

Analysis DataGravity appears to be working on a kind of GUI-driven SQL for unstructured data so small to medium businesses can run data analytics, possibly without having to hire data scientists – although this has not been confirmed.

After studying a DataGravity blog closely, along with other blogs and reports around the 'net, Vulture Central thinks it has sussed out what the startup is about at a high level.

DataGravity is a startup founded by Paul Long, who founded EqualLogic and John Joseph, an EqualLogic marketing and product management exec, after Dell purchased EqualLogic for $1.4bn in 2008.

What we appear to be looking at is a DataGravity appliance for small and medium businesses (SMBs) which are accumulating unstructured data stored in multiple silos that can be on-premises, in remote offices or in the cloud.

Business users in departments such as HR, marketing, sales, legal, and finance may want to look into files to find out, for example, why recruits of a certain type perform better than others, or which social networking posts ultimately generated the most cash, and so on.

These are ad hoc queries which can not be easily generated using SQL; the data is not structured and the end users don't know and don't want to know SQL.

They want to sit at a screen and use a powerful but easy-to-understand GUI to pull up all sorts of information and images stored in multiple files across many different storage systems around the company. They don't want to run individual, manual searches of mail records and so on, when a single search for, say, "oil + gas" plus "marketing" should suffice.

So DataGravity's appliance, we surmise, will enable them to analyze when their company sold into the oil + gas market, who did it, who helped, to what degree, what worked and what didn't, and in real-time. The idea is to build on existing expertise and resources in the company to make faster and better decisions and improve the business's performance.

DataGravity analytics

DataGravity analytics schematic diagram.

OK, how can it do this with the source data scattered all over the storage landscape in different locations, arrays, and filetypes, in real-time. There's no way it can do this of it has to look in all the target arrays and files, none, nada, zip.

It has to be a search of metadata in the appliance. So, logically, that metadata has to be generated by some kind of bot trawling through the SMB's filestores, and being aware of different file formats and storage facility locations and accesses.

In other words there is a sort of content management system indexing the overall filesystem's metadata and building (here, we're guessing) a structured metadata database. Pre-built analytic routines (aka search requests) can be given parameters by the users, through the GUI, and search the metadata, pulling up the results (aka reports) in real-time.

The users get access to the data and experts they need to help them work out how to things faster sand better. We understand there'll be some kind of collaboration facility for users as well.

One question is whether DataGravity's SW will run full text indexing on unstructured data files? That will greatly widen the scope of analytics search terms but would entail much larger metadata files. It would also mean the users could pull up source data; mails, documents, videos, images, contact details, whatever.

Another question is how DataGravity customers will be able to get significant wins early from using the software. We'd guess that search universe and search types would initially be restricted to the most promising data areas.

DataGravity exhibited at the recent VMware PEX in Las Vegas and is recruiting partners. We expect product announcement later this year.

A cautionary note: all of the above is what we have worked out from what material is available. Read DataGravity's blogs and see what you think. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.