Skip to content

Scale out NAS development and application!

Data explosion is taking place at an alarming data and the need to find suitable solutions to store data has become an increasingly complex endeavor for enterprise users.

According to statistics gained from IDC study, non-structured file-type data is increasing at the fastest rate and predicted to occupy 80% of the total storage capacity by the end of 2016. Therefore highly valuable enterprise data, like performance data generated from operations, must be securely stored like bank account information. But the big challenge to enterprise users will be to deal with skyrocketing data growth.

Scale out Storage comes to rescue- It is a well known fact that NAS is treated as the best option for storing non-structured data that may be scattered through-out millions of files. Therefore, with the help of a NAS, businesses using multiple servers, can share the storage resources by using an IP network. But as data deluge is taking place at a higher level than expected, even those with peta byte-level capacity can hardly keep up. To store the ever-increasing amount of data, enterprises have to acquire more and more NAS devices, which in-turn pave way to information islands due to the presence of multiple file systems, multiple naming spaces and multiple attachment points.

This is where Scale-out NAS is emerging as a new trend in storage as the scale-up model approach is ending.

The concept of Scale-out storage is enthralling as it offers an unparalleled advantage in flexibility that enables enterprise users to purchase storage on-demand. Enterprise users can purchase storage for whatever performance or capacity levels they require. Without having to acquire expensive large-capacity devices immediately, they can save on CAPEX significantly.

Another advantage of scale-out storage lies in its excellent manageability. No matter how many controllers and disks a user has bought and deployed, they work as one single computing source. And managing one system is definitely easier than managing multiple ones.

Scale out NAS is used for applications such as file archives and web applications

File archives- Hardcopy paper records are hard to save or retrieve. Advancements in high-speed scan and storage technologies have driven digitizing paper records such as manually processed bills in the financial field and criminal case files in the legal field. Such applications do not have high requirements for performance but do have high capacity requirements, meaning that they are cost-sensitive. Scale-out NAS addresses these demands with its unparalleled scalability.

For Web applications- Common web applications like blogs, online social communities, and online stores demand high storage capacity, as users of these applications demand spacious storage for an uncountable amount of digital photos and video files uploaded onto blogs and online social community sites, not to mention the digital photos and flash files for thousands of commodities on online stores. Each user demands increasingly larger storage space while the storage dilemma is compacted by more and more new users. Unlike storage demands in an enterprise’s data center, storage demands of these applications are not really predictable. To address these storage demands, a highly scalable storage architecture that enables storage to scale out with service growth is required. Scale-out NAS has its advantages in this regard.

StoneFly, Inc, a wholly owned subsidiary of Dynamic Network Factory goes a step ahead and offers super scale-out breed of NAS appliances in its product catalog.

StoneFly Super Scale Out (SSO) NAS storage appliance deliver unprecedented performance, redundancy and scalability. These appliances are designed for customers requiring a powerful storage solution that can scale out storage capacity while scaling up performance. StoneFly SSO NAS nodes scale up to 256 drives and 2 PetaBytes (2,048 TeraBytes) of storage per node, and easily scale out to multiple nodes on demand. Perfect for managing large quantities of unstructured (file-based) data within a single global namespace and a single file system.

The Super Scale Out NAS appliance offered by StoneFly are optimized for markets that require vast quantities of high bandwidth or fast parallel throughput for very large files required by high performance computing in media and entertainment. Available in choice of single nodes or mirrored twin Scale out NAS nodes that create a clustered replica of your data for even higher availability.

StoneFly Twin Scale out (TSO) NAS storage appliance delivers unprecedented performance, redundancy and scalability. The TSO consists of mirrored twin Scale out NAS nodes that create a clustered replica of your data and scale up to 36 drives and 288 TeraBytes of storage per chassis, and easily scale out to multiple nodes on demand. Perfect for managing large quantities of unstructured (file-based) data within a single global namespace and a single file system. TSO was designed for markets that require vast quantities of high bandwidth or fast parallel throughputs for very large files required by high performance computing in media and entertainment, but also require maximum redundancy.

Server hosting on a cloud virtual server vs. dedicated server

Cloud computing technology is prospering at an enormous rate in IT industry, and so a company’s server hosting requirements can be quenched with two instances. One is to go for a dedicated server and the other one is to go for a cloud hosted server. This article will try to focus on the merits of these solutions, from a neutral point of view.

Cloud Web Hosting- Cloud hosting has emerged as the next big thing in the server hosting world, as it undoubtedly has enough potential to, one day, become the one and only solution for data and hosting storage. In this concept, the server is outsourced and run on virtual software by a remote operating company. Several data centers are running on virtual server, which means that a single server produces many virtual servers and, from user’s POV, the functioning looks similar to that of a dedicated server, which is not in reality.

Dedicated Server- Dedicated servers have been around from more than two decades. They are the most conventional, trustworthy, and highly recommended for hosting services like we apps, interactive websites and virtually anything. Getting a dedicated service follows an easy protocol, where a particular user leases or purchases a server from a providing company and then pays monthly fees for the services. Price Comparisons- When it comes to dedicated servers, the monthly costs might range from $100 to $1000, varying on the packages and features they are opting for or being offered. Some instances can start off at $50 and can cost more, depending on your requirements.

In terms of cloud hosting, prices are much more variable, as they depend greatly on the storage space that is required, and the amount of time the service will be accessed.

Performance – when it comes to performance, both of them are reliable. A Dedicated web hosting servers are fast and reliable, not under performing at all when compared to their cloud counterparts. However, they do differ in one factor. The resource segment of a dedicated server is usually used below 60%, meaning that it never runs at full capacity. Whereas a cloud server can save a lot of electricity and money and has the full potential to replace several dedicated servers.

How can organizations shield themselves from data breaches?

Organizations all over the world are learning out ways to shield their enterprise environments from data breaches. As a part of this practice, there’s more money currently dedicated to stop data breaches than ever before. However, all this money isn’t estimated to be sent in the right direction to truly put a stop to the problem.

The Identity Theft Resource Center tracked nearly 28% more breaches in 2014 than 2013. Data compromised in these breaches ranges from personally identifiable information to proprietary business intelligence, and every piece of it comes with a cost.

According to the Ponemon Institute found, for illustration, which the average cost-per-record of a data breach was approximately $200. The study also found that these breaches aren’t always attacks from hackers; more than 78 percent of data breaches result from accidental employee slipups or the occasional disgruntled worker taking his frustration out in the wrong way.

Alright, on going through each of this threat specifically, we can come to a conclusion that from external threat perspective, Firewalls are ineffective against more sophisticated attacks. Backdoor access without the knowledge of the admin is the best example, where nearly unfettered access to confidential and sensitive information that make up company’s crow jewels is observed.

Therefore, in the absence of a holistic approach to secure and manage sensitive data, from the inside out, companies are doing themselves a disservice by not minimizing their risk posture and breach potential. Adding to this, workers charged with securing and managing sensitive data may not always collaborate to establish the kind of holistic control that is expected.

Therefore, when the day the company realizes that it has been hacked, it is far too late. And simply responding to the attack months later and closing the exploited path into a network isn’t enough. The trick of the trade should be to protect information internally as much as it’s about keeping the bad guys on the other side of the wall at bay.

The wise thinking is that instead of busy focusing on keeping hackers out, it is better to have preventive data management strategies and solutions on premises which make it easy to identify critical info and make it harder for cyber-criminals to do any damage, even if they do work around the firewall.

This starts a new issue with data security and that is to first learn the route a hacker took to compromise data and then to counteract their strategy altogether. This could be done by adapting to evolving technologies like vulnerability scanning, email protection, behavior monitoring, browser exploit protection, file reputation services or leveraging data-aware technology.

Small and Medium scale businesses in particular are especially interested in new, more holistic concepts; but enterprise-level security solutions are entirely too expensive for the SMBs, not to mention these teams rarely have enough personnel and resources to manage so many disparate IT and data solutions.

Therefore, by securing data from the inside helps both IT workers and that in-charge of managing security understand their actual risk posture, as well as the information they truly need to protect. This approach with information assets is vital in the management and protection process.

Keeping hackers out with always be the top priority. But at the same time, strangulating the inside concerns should also be a top requirement. Employee records, customer information and proprietary business data are typically the most sought-after files for inside data breach culprits.

However, these are often compromised through the accessing of unstructured “dark data” in the form of older, forgotten files within employee accounts. A simple password list used at the start of employment can be easily neglected over time and exploited by a cybercriminal months or years later. Beyond the cost of the data breach, this kind of unstructured, unsecured information can result in hefty regulatory fines for noncompliance.

Lastly, the numbers suggest that there’s clearly a need for a shift in the way businesses approach managing and protecting their most significant information assets. It isn’t just about keeping the bad guys at bay. It’s about making sure the good guys have control of the inside.

DNF Corp offers IT Infrastructure to defense sector!

Data Storage is emerging as an increasingly important issue in the US military sector. As the defense field is getting close towards a networked force, U.S. Defense Department leaders are beginning to pay close attention to how and where to store the accumulating vital info and images that sophisticated technologies are gathering in enormous quantities. After all, the data related to dense field should not only have to be kept somewhere, but it also must be readily accessible to be valuable.

According to Defense Department officials, one of the key elements in their planning process is to determine the benefits that stored data can deliver. While companies have already discovered that the insights that stored data provide increase their bottom line, the military has yet to ascertain and explain exactly how stored data can serve the forces. This assessment is the first step toward taking data storage into the limelight, they say. However, designing the metrics that can measure the benefits is a quandary in itself.

Military leaders all over the world have started to recognize that in this information age, data acts as a powerful weapon. So, once the intelligence has been gathered, reports have been created and collaboration taken place, the bits and bytes must be saved in a secure place. Therefore, data storage must be viewed as an important part in the information assurance arsenal as well.

In enterprise data storage environment, a server-centric storage approach is followed. This approach supports enterprise connectivity, which means that users can concurrently connect to and store and retrieve data from all major computing platforms. In a similar way, on knowing the benefits with such approach, military units are working in an information-centric environment so they can leverage the data to achieve operational and mission goals rather than spend time and energy managing technology assets.

Thus, with the enterprise information storage capability, the military can reduce the number of required personnel to handle the data. Also, if the data is in a central location, it can be made available to more people in the right format and at the right time. Thus, with this approach quick access to information can be reciprocated which could reduce the duration of an operation, saving both time and money.

Thus, the storage for defense sector must exhibit the following qualities

  • Enable and support the Army’s initiative to virtualize its entire infrastructure, so that it uses little to no actual physical space in the field.
  • Be able to move from place to place and operate on its own anywhere in the world at any given time.
  • Be free of excess weight.
  • Operate on only the power that Army units take with them into the field.
  • Be easy to deploy and manage, especially for IT-skilled soldiers with little to no experience in storage.
  • Most importantly, it must be highly available with no single points of failure to enable the Army to communicate and operate without interruption in the field.

Dynamic Network Factory Corporation (DNF Corp) has been a supplier of rugged and extreme environment IT systems for nearly two decades. Their hardware and expertise has been used in threat detection and recognition systems, deployed command and control systems for naval defense, information warfare technology, and advanced countermeasure systems.

DNF Offers Rugged NAS/IP SAN/Server Converged Architecture Platforms with the feature of MIL-STD-810F Compliance; specifically designed for harsh shipboard, airborne, or land-based applications. These easy-to deploy, and high performance systems come with all aluminum construction, shock and vibration resistance, and offer superior cooling and EMI/EMC (Electromagnetic Interference/Electromagnetic Compatibility) Performance.

Additionally, DNF Corp also offers dedicated solutions for telecommunication sector. Its NEBS complaint systems, which are labeled as Tesla solutions are specifically designed with the telecommunication industry in mind. These easy to deploy and high performance systems help telecoms integrate Next Generation Networks into central office carrier facilities.

Thus, DNF offers systems which are perfectly designed to quench Terabytes and even Petabytes of storage needed in Military Defense applications.

To know more call 510.265.1122 or click on Dynamic Network Factory web page

Improving storage efficiency in an enterprise IT environment with Unified Storage Server concept

Enterprises businesses are nowadays generating a lot of data in their premises. Irrespective of the field it belongs to, each enterprise is becoming highly dependant on the data it is generating, due to its business value. Infact, we can also see it in this way- that means, businesses are learning to reap in some value from their generated data.  Therefore, in order to meet the data generation standards, the need to store the data in an efficient and affordable way turns vital.

The best approach is to use a storage system with four main features: a unified platform, space-saving technology, flexibility, and low upfront costs. Together, these features ensure efficiency and save money.

The best way to improve storage efficiency in a cost-effective way is to go for a Unified Storage server concept. A unified storage platform allows you to consolidate your enterprise IT servers and storage needs into a single hardware platform. This in-turn helps in reducing power consumption, cooling requirements, rack-space and overall cost compared to systems with separate physical servers and physical storage.

Space saving centralized storage- As said in earlier paragraph, instead of using several servers for enterprise application, using a single server along with storage- the Unified Storage Server model makes a lot of sense. These intelligent appliances are driven by software in such a way that they can also cut down the storage needs for different applications with the help of technologies like Thin Provisioning and Deduplication. That means you can store large volumes of data for less money.

Having a scalable storage- As your business grows, data starts to accumulate simultaneously. The traditional answer is to re-organize your data and buy separate units for different data types. This makes your data storage more complex and expensive in both hardware and time. But with Software defined storage solution backed up with a Unified Storage and server concept, this task turns simple. As you application grows, allocation of storage is possible. If an application fails to live up to the expectations, its storage can be administered to other applications.

StoneFly, Inc., offers USS Series of Unified Storage & Server appliances with capacities up to 192TB and available in 6GB SATA, SAS or SSD combinations. StoneFly USS is a highly available and redundant solution, in terms of storage. The company is a pioneer in offering iSCSI storage and so its Unified Storage & Server appliances are the ideal hyper-converged infrastructure solution to consolidate all of your Server and Storage systems into one easy to manage appliance.

Use of virtualized operating systems allows for complete hardware utilization and considerable reduction in power and cooling costs. By migrating your existing Windows and Linux physical servers to VMware-compatible Virtual Machines on the StoneFly USS appliance, you can greatly reduce your hardware footprint and run many more applications on much less hardware.

Campus mirroring to a second on-premises StoneFly USS appliance and asynchronous replication to a USS appliance at a remote site or in the cloud makes the USS the perfect business continuity and disaster recovery solution.

To know more call 510.265.1616 or click on StoneFly Unified Storage Server appliance

IP Video Surveillance for Hospitals!

Video Surveillance presence in hospitals, healthcare facilities and nursing homes is turning crucial nowadays. The presence of a video surveillance solution not only raises the security factor bar in the premises, but also controls unnecessary cost. Thus, with such a system in place, patients are protected, the employees are protected, and the administration can keep an eye on the employers in order to increase productivity.

With the advancements in technology, monitoring in hospitals is going through a new phase. IP cameras are slowing taking the place of Analog ones in this field and that is due to the prime fact that remote video monitoring is possible.

Some benefits of having IP Video Surveillance in Hospitals

Security and safety in the premises increases as crimes such as break-ins, injuries to patients and employees can be easily prevented if they occur within the hospital. This is done with the help of proactive systems and to a certain extent with reactive systems tagged to live monitoring.

Productivity- If the hospital staff know that their activities are being watched, then their productivity will automatically increase. Communication can improve, as the administration knows what is going on in the premises and more will get done.

Prevent dishonesty- They are many instances, when a visitor or a patient may state that they were injured on the hospital’s property. If there is visual evidence through IP cameras, these claims can be proved either way. This can save the hospital from being sued, which can save them money in their insurance premiums.

Storage- IP based surveillance systems can take advantage of digital storage. The footage can be recorded on network servers, on hard drives or on NVRs. Additionally, storage providing companies for video surveillance such as DNF Security are coming up with Unified Solutions where consolidation of servers and storage systems into a single hardware platform is possible in order to help reduce power consumption, cooling requirements, rack-space and overall cost compared to systems with separate physical servers and physical storage.

Remote Monitoring- Remote monitoring is an important aspect of IP cameras for the fact that what is going on within the hospital can be viewed from a remote location. If an administrator needs to view a particular area of the hospital while they are vacationing in Mexico, they can. If they want to check in while they are at home, they can. All they need is access to the IP camera’s network via the Internet. Note- Although, this feature is nowadays available with analog system based DVRs connecting to a WAN, the benefits are not as much when compared to IP video surveillance.

Thus, to prevent unnecessary loss and effectively manage emergency situations at hospitals or healthcare centers, going for an IP video surveillance system is the right solution for your security needs.

An IP video surveillance system has a centralized system control, which offers better communication. The camera is equipped with a preset threat identification and notification system, which allows a bouquet of benefits.


Data Storage company Coraid officially shuts down its business!

Data Storage company CORAID which offered an array of products to data centers has decided to shut down business on an official note. The company’s founder and chief scientist Brantley Coile announced yesterday on their company’s LinkedIn page that the business is now disbanded.

From the past few months the company started to show the signs such as axing its professional administrative and support staff. In January 2015, there was a strong buzz in the storage industry that the SAN start-up was struggling to survive in the industry was cutting down its head count, in order to cut down their functional expenses.

As per a CRN report, the UK staff of Coraid had abandoned the company in April 2012, on seeing the signs of shut down. And since Jan, this year the support team of CORAID stopped taking calls and instead gave a recorded message to their customers “we’ll get back to you” which actually never happened. After a couple of weeks, an insider confirmed that Coraid support is not answering calls as the account managers have been axed.

As soon as the media started to circulate this news, Coraid CEO David Kresse announced that the company has been attempting to raise new capital over the last few months and within a couple of months, will be back with a bang.

But yesterday, Founder Brantley Coile announced on the company’s LinkedIn Page that there is now no more Coraid and all its assets were auctioned last week. He added in the post that all the board members have resigned and thanked all the people who worked very hard for the company till date.

Coraid was found in the year 2000 and was headquartered Redwood city, California. Its AoE technology was a simple protocol for building block access storage. Based on this technology the company racked up more than 1,000 customers before taking on venture capital. Its customers included US Department of Defense and the National Institute of Health. But the advantages of it were never strong enough to persuade mainstream SAN users to switch.

As iSCSI Storage technology alias IP SAN technology began to flourish many startups invaded the SAN space with newer, faster and appealing products making Coraid fall behind and become a niche player.


Get every new post delivered to your Inbox.

Join 73 other followers