Feeds

How much data must you have before you need Cleversafe? If you have to ask ...

We could tell you who has enough, but then we'd have to kill you

Choosing a cloud hosting partner with confidence

Analysis: Cleversafe is the leading object storage supplier, according to an IDC marketscape chart (see below). How did it get there?

We talked to Chris Gladwin, its founder, about how and why Cleversafe was started up and how it got where it is. The story starts in 2004 when he sold his second start-up, digital music supplier MusicNow, to Circuit City. It was then sold on to AOL "and became a huge success."

What next?

Gladwin says he thought that data storage volumes were going to skyrocket; the growing need for storage "was going to be massive". He said just extrapolate a 50 per cent growth rate for ten years and see where you get to. [A bit more than 57 times what you started with - Ed.]

Existing filer and block array storage technology couldn't scale up to petabyte-and-beyond levels: "buying three storage systems for protection, and using RAID (parity-based) wasn't right."

Gladwin had experience with wireless infrastructure and knowledge of telecoms; in particular the limitations of and move on from circuit switching. Before the Internet and IP telephony, telcos set up calls by dedicating a circuit to a call. Circuits were switched, inside switches so that there was a dedicated link between caller and callee.

IDC object storage marketscape

This technology could not scale. It wasn't realistic to build switches with a million lines (circuits). So it was changed and we have packet-switching. Data is sliced up into packets and individual packets are routed across the Internet, being reassembled into a copy of the data at the far end of the link. It's a stateless method.

What if an analogous approach could be taken with massive amounts of data, with the storage system slicing up data into pieces, slices in Cleversafe terms, and storing these across nodes in the system; re-assembling the file whenever it was needed.

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.