The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

The New Wave On The Cloud: Object Based Storage

Is your data exponentially growing? Are you using orthodox storage systems like Storage Area Network (SAN) and Network Attached Storage (NAS)? Cloud computing with its numerous benefits and innovative capabilities now offers a novel way of working with data through ‘Object based storage model’. Due to the ever increasing pressure exerted by the industry on the interface to storage, the storage technology has progressed to the point that a change in the device interface is needed. Well, the answer perhaps lies with object based storage, an emerging standard aimed to address this problem. Let’s further elaborate about object based storage.

Objects can be categorized as either:history

  1. Files
  2. Blocks

While files provide user applications with a higher-level storage abstraction that enables secure data sharing across different operating system platforms, blocks offer fast, scalable access to shared data. Having said that, the third related aspect is the all-important metadata which is basically data providing information about one or more aspects of the data, such as means of creation, purpose, time and date of creation, location, and author of the data. In a nutshell, object-based storage separates metadata from object data, storing it all on one level, rather than as a hierarchy as with traditional file-based storage.

With this understanding, you might think that object based storage is beneficial for large companies only, but that is not the case. At the outset, Cleversafe has been labeled as the pioneer in object storage by leading analyst firms. The breaking news is the fact that this innovative technology is now being made available to small to mid-size companies trying to cope with growing data needs. The Bunker, with its managed service, in partnership with Cleversafe, is providing small and mid-sized businesses to take advantage of object storage, its scalability and inherent security, which encrypts data both in transit and at rest. The best part is that you only pay for what you use!

Phil-Bindley-CTOPhilip Bindley, CTO at The Bunker comments: “IT leaders are faced with increasing challenges for data storage; the amount of data is growing exponentially and storage is consuming an ever-greater share of available IT budget. The cost and flexibility of public cloud storage have offered some respite, but at the expense of security and compliance for many businesses. We believe our Object Storage managed service solves all of these challenges for businesses, particularly in providing secure robust cloud storage that addresses data sovereignty and compliance requirements.”

The notable effect of object based storage is separating or offloading the entire space utilized by blocks from storage applications. For instance, in a traditional file system architecture, block-based file systems can roughly be divided into two sections: a user component (files and directories) and a storage component (mapping data structure to physical storage), making it simpler to offload management to the storage device, which is the intended effect of object based storage.

An added benefit is the enhanced De-duplication capability – a process of comparing electronic records based on their characteristics, from which the legal e-Discovery industry can enormously benefit. In offloading metadata to the storage device, objects remove the dependency between the metadata and storage application, making data sharing between different storage applications viable.

What about security aspects of object based storage over the cloud?

Unlike block based storage, security is the single most distinguishable feature of object based storage. A few important security benefits provided by object based storage are:

  1. Cross platform data sharing and application level security (objects enable creation of multiple security domains whose access policies are individually determined by the storage applications)
  2. Increased capability of self-management within storage devices such as recovering from failures and regular backups.
  3. The security enforcement policy is set by the storage application, while object based storage devices provide only the mechanism

Invariably, object based storage was designed to exploit the increasing capabilities of storage devices, and replacing traditional block interfaces with objects is a major breakthrough.

By Syed Raza

Sorry, comments are closed for this post.

Comic
When Sci-Fi Predictions Come To Fruition

When Sci-Fi Predictions Come To Fruition

Evolution of Technologies To paraphrase science fiction author Arthur C. Clark, those who make predictions about the future are either “considered conservative now and mocked later, or mocked now and proved right when they are no longer around to enjoy the acclaim.” The one thing we can be sure about, Clark ventured, is that “[the…

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Hopes To Extend Internet Connectivity With Solar-Powered Drones

Facebook Inc (FB.O) said on Thursday it had completed a successful test flight of a solar-powered drone that it hopes will help it extend internet connectivity to every corner of the planet. Aquila, Facebook’s lightweight, high-altitude aircraft, flew at a few thousand feet for 96 minutes in Yuma, Arizona, Chief Executive Mark Zuckerberg wrote in…

When Will Women In Tech Become The Norm?

When Will Women In Tech Become The Norm?

Tech Diversity It is well known that the technology industry has been dominated by men, but it is also clear that the industry is working to change that. Diversity in the tech industry, especially where it applies to women in tech, has been a topic of discussion for years. Recently the Washington Technology Industry Association…

Four Keys For Telecoms Competing In A Digital World

Four Keys For Telecoms Competing In A Digital World

Competing in a Digital World Telecoms, otherwise largely known as Communications Service Providers (CSPs), have traditionally made the lion’s share of their revenue from providing pipes and infrastructure. Now CSPs face increased competition, not so much from each other, but with digital service providers (DSPs) like Netflix, Google, Amazon, Facebook, and Apple, all of whom…

Edtech and Virtual Reality – Exciting Learning Environment

Edtech and Virtual Reality – Exciting Learning Environment

Customizing Edutech Customized edtech learning solutions are becoming more commonplace as the education industry recognises their potential and begins transforming the traditional structures so as to incorporate innovative developments. From textbooks to tablets, chalkboards to virtual reality, edtech promises not only dynamic and exciting learning environments but better learning strategies and solutions. Virtual Reality and…

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation: Not Just For Large Enterprises Anymore

Digital Transformation Digital transformation is the acceleration of business activities, processes, and operational models to fully embrace the changes and opportunities of digital technologies. The concept is not new; we’ve been talking about it in one way or another for decades: paperless office, BYOD, user experience, consumerization of IT – all of these were stepping…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Surprising Facts and Stats About The Big Data Industry

Surprising Facts and Stats About The Big Data Industry

Facts and Stats About The Big Data Industry If you start talking about big data to someone who is not in the industry, they immediately conjure up images of giant warehouses full of servers, staff poring over page after page of numbers and statistics, and some big brother-esque official sat in a huge government building…

Business Analytics Vs Data Science

Business Analytics Vs Data Science

Big Data Continues To Grow Big Data continues to be a much discussed topic of interest and for good reason.  According to a recent report from International Data Corporation (IDC), “worldwide revenues for big data and business analytics will grow from nearly $122 billion in 2015 to more than $187 billion in 2019, an increase…

Who’s Who In The Booming World Of Data Science

Who’s Who In The Booming World Of Data Science

The World of Data Science The nature of work and business in today’s super-connected world means that every second of every day, the world produces an astonishing amount of data. Consider some of these statistics; every minute, Facebook users share nearly 2.5 million pieces of content, YouTube users upload over 72 hours of content, Apple…

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth

5 Ways The Internet of Things Will Drive Cloud Growth The Internet of Things is the latest term to describe the interconnectivity of all our devices and home appliances. The goal of the internet of things is to create universal applications that are connected to all of the lights, TVs, door locks, air conditioning, and…

Infographic Introduction – Benefits of Cloud Computing

Infographic Introduction – Benefits of Cloud Computing

Benefits of Cloud Computing Based on Aberdeen Group’s Computer Intelligence Dataset, there are more than 1.6 billion permutations to choose from when it comes to cloud computing solutions. So what, on the face of it, appears to be pretty simple is actually both complex and dynamic regardless of whether you’re in the market for networking,…

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups

10 Trending US Cities For Tech Jobs And Startups Traditionally actors headed for Hollywood while techies made a beeline for Silicon Valley. But times are changing, and with technological job opportunities expanding (Infographic), new hotspots are emerging that offer fantastic opportunities for tech jobs and startup companies in the industry. ZipRecruiter, an online recruitment and job…