Cloud Storage Appropriate Data - InformationWeek
IoT
IoT
Cloud
Commentary
12/17/2010
09:32 AM
George Crump
George Crump
Commentary
50%
50%
RELATED EVENTS
Ransomware: Latest Developments & How to Defend Against Them
Nov 01, 2017
Ransomware is one of the fastest growing types of malware, and new breeds that escalate quickly ar ...Read More>>

Cloud Storage Appropriate Data

As vendors continue to mature the cloud storage on-ramps we discussed previously, the use case for cloud storage is becoming more wide spread. What was once primarily backup and archive storage destination is now quickly becoming an option for primary data storage. As a result the data that you are going to involve in a cloud storage solution may be different than it was only a year ago.

As vendors continue to mature the cloud storage on-ramps we discussed previously, the use case for cloud storage is becoming more wide spread. What was once primarily backup and archive storage destination is now quickly becoming an option for primary data storage. As a result the data that you are going to involve in a cloud storage solution may be different than it was only a year ago.As we discussed in our recent webinar "What's Your Cloud Strategy, Answering The Top Ten Questions", cloud storage, at least in the public sense, still has a bottleneck in the connection from your data center to the WAN. When using cloud for primary storage, we are looking for use cases where only a small percentage of the data set is active at any point in time. That active data set would be cached in some manor locally.

We are also looking for data sets when requests being made from the non-active section of the data set are relatively small in size. That non-active data set could be quite large but we have an ability to access the small sub-sets of that data. As we discussed in our recent article "How To Add NAS To A SAN" a file sharing function is an excellent example of a small working data set, and large but granularly accessible inactive data set. In most NAS or fileserver environments only a very small percentage of the total data is active at any point in time. It can be easily cached locally on a appliance or virtual machine. If data is not in the local cache, then we can just transfer the needed file from cloud storage not the entire file system.

This concept of a small working data set, and large but granularly accessible inactive data set, can expand well beyond file systems. With some software intelligence and understanding of how specific applications store data, cloud storage for primary data can be used for semi-structured databases like Sharepoint or Exchange. Both of these applications have relatively small databases of either file meta-data or messages, but both have very large blob type components that stores either related files or attachments. Those blobs have portions that are active, today's files, and then the rest of the blob is dormant, seldom being accessed. As a result these applications and applications like them have become an ideal data set for cloud storage.

Part of a cloud storage strategy is understanding your data to look for data that is appropriate for cloud storage. Avoid data sets that are new, very active across the whole data set or are extremely large. This means that today very active databases and storage for virtualized server environments probably need to be local. For the remaining data sets, which for most data centers will be the majority of their storage consumption, cloud storage is worth consideration.

Track us on Twitter: http://twitter.com/storageswiss

Subscribe to our RSS feed.

George Crump is lead analyst of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. Find Storage Switzerland's disclosure statement here.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
2017 State of IT Report
In today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll