Yottabytes: Storage and Disaster Recovery


February 25, 2011  11:56 PM

Moon Project Switches Storage

Sharon Fisher Sharon Fisher Profile: Sharon Fisher

Ever been in the middle of a project and found out the storage system wasn’t big enough?

Now, imagine the device on the other end, generating the data, is a giant camera taking pictures of the moon, and you see the problem.

The Lunar Orbiter Laser Altimeter (LOLA) uses a technique known as remote sensing to draw a precise topographical map of the moon. When it’s done, scientists will basically have a GPS system for the moon, all ready to go, next time we send people to the moon. The purpose is to identify ideal landing sites and areas of permanent shadow and illumination. (Depending on what sorts of cameras LOLA has, imagery could also help scientists determine the amount of water, the type of dirt, and even whether there’s any plan life on the moon, as well as the best places to put a cell tower.)

Basically, according to NASA, the technology works by splitting a single laser pulse into five beams. These beams then strike and are backscattered from the lunar surface. From the return pulse, the LOLA electronics determines the time of flight which, accounting for the speed of light, provides a precise measurement of the range from the spacecraft to the lunar surface.

It’s the same sort of technology spy satellites use on the Earth now. The difference between this and the sort of imagery done of the moon before is one of detail. Where previous images had errors of from one to ten kilometers (about 0.62 to 6.2 miles, the LOLA system is down to the level of 30 meters (almost 100 feet) or less spatially and one meter (almost 3.3 feet) vertically. (In comparison, commercial satellites can take pictures of things on the earth as small as half a meter — and government satellites can take pictures at an even higher resolution.)

What this means, though, is that after a year up in space, LOLA had taken nearly three billion range measurements, compared with about eight million to nine million each from three recent international lunar missions, NASA said.

That’s a lotta data.

So that’s where the new storage system came in. The Arizona State University School of Earth and Space Exploration (SESE) deployed an EMC Isilon network attached storage (NAS) system to hold the tens of thousands of moon images. SESE can also replicate its lunar imagery to a second Isilon NL cluster, using Isilon’s SyncIQ asynchronous replication application.

Because the project is expected to last until 2014, the school’s previous NAS — which wasn’t identified, but which according to SearchStorage.com was Network Appliance — couldn’t handle the projected load, which adds up to more than a petabyte of capacity in the Isilon system.

Ironically, though EMC — which purchased Isilon for $2.25 billion last fall — sent out the press release announcing the project, it was pretty much all set up before the EMC purchase and had little to do with EMC itself. In fact, the project manager wasn’t all that thrilled with the news of the EMC purchase, and he is somewhat concerned about EMC’s ability to continue to support the project, SearchStorage said.

Ernest Bowman-Cisneros, manager, LROC Science Operations Center at SESE was reportedly testing Isilon’s system at the same time EMC was negotiating the Isilon acquisition, but didn’t know it. “It wasn’t until after we signed on the dotted line that we found out about EMC,” SearchStorage quoted Bowman-Cisneros as saying. “By the end of December, we had completed our testing and decided to go with their system. At this point, [the acquisition has] been inconsequential to us. My only concern is that EMC will continue to develop and support the model I have. “

Here’s hoping. It’s another three years before the project is completed .

February 14, 2011  11:38 PM

Millions of Medical Records Stolen from Unlocked Van

Sharon Fisher Sharon Fisher Profile: Sharon Fisher

All the data security in the world doesn’t help if you don’t lock the damn door.

Medical and financial records of about 1.7 million people — mostly patients — from  Jacobi Medical Center, North Central Bronx Hospital, Gunhill Health Center, and Tremont Health Center in New York’s The Bronx were stolen in December, iHealthbeat reported. The news is coming out now because the 1.7 million people are all receiving letters explaining the problem to them and offering them an information hot line, customer care centers, and free credit monitoring and fraud resolution services for one year if they register within the next 120 days, according to an article in the New York Times.

Was it a Russian hacker? Malware?

No, the problem is that the affected information was stored on magnetic data tapes left in an unlocked van belonging to GRM Information Management Services, the city’s health record vendor. The tapes were reportedly being moved to a “a secure storage location.”

It sounds like the punch line to a joke — the saying “Never underestimate the bandwidth of a station wagon full of mag tapes speeding down the highway” has been around since the 1990s. But apparently it’s all too real. The New York Health and Hospitals Corp. has since fired GRM and has filed suit against the company to hold it responsible for covering all damages related to the loss of the data.

NBC New York quoted an HHC spokeswoman as saying that there had been no reports of any access to the data, and that “highly specialized and technical expertise and certain tools” would be required for the thief to gain access to the data. Nonetheless, the organization is legally required to notify all the victims and take steps to mitigate any damages. (To add insult to injury, this was the third time the organization had been hit by theft, though the previous instances were much smaller.)

Lessons to be learned? The first step in storage and backup security is physical access, and that data loss is less often caused by hackers and viruses than is commonly believed.


February 11, 2011  2:06 PM

Storage Costs Forcing Governments to Move GIS to the Cloud

Sharon Fisher Sharon Fisher Profile: Sharon Fisher

Numerous government entities, ranging from local to national, use geographic information systems (GIS) software as a way of collecting and displaying information on a geographic basis. GIS performs a variety of jobs, including developing maps; tracking land development; and placing infrastructure such as roads, cell towers, and fire stations.

However, GIS files can be humongous. In Oregon, for example, the Oregon Geospatial Enterprise Office currently manages 4 TB of geospatial data on behalf of the enterprise GIS community in Oregon, which is expected to grow to nearly 15 TB of stored data in the next few years. The increasing size and cost of the storage required — as well as the people to manage it — are forcing a number of governments to look at moving GIS storage to the cloud, according to an article by Rutrell Yasin in Government Computer News.

Results are due today for a Request for Information submitted by the Western States Contracting Alliance, a consortium consisting of Alaska, Arizona, California, Colorado, Hawaii, Idaho, Minnesota, Montana, Nevada, New Mexico, Oregon, South Dakota, Utah, Washington, and Wyoming. This particular RFI was submitted by Montana, with active participation from the states of Colorado, Oregon, and Utah, but it may result in a desire to place some, or all, GIS services for the participating states in the cloud, the RFI said. In fact, this is potentially true for all 51 members (50 states plus District of Columbia) of the National Association of State Purchasing Officials (NASCO) Cooperative.

“Basically, it is our GIS folks who are saying storage is expensive” and want to find cheaper methods of storing GIS data, Utah CIO Stephen Fletcher was quoted as saying in the GCN article.


February 5, 2011  2:25 PM

Egypt’s Internet Blockage: Could It Happen Here?

Sharon Fisher Sharon Fisher Profile: Sharon Fisher

It didn’t take long for the question of “How did Egypt shut down the Internet?” to “Could it happen here?” and “What do we do if it does?”

To many people in U.S., the first inkling of trouble in Egypt was not from the political pages, but from Facebook, Twitter, and the press talking about the technical issues of the Egyptian government shutting down the Internet.

U.S. Senator Joe Lieberman (ID-Conn.) attempted to leverage the Egyptian situation as a means of encouraging interest in his own cybersecurity bill, which has been languishing in the U.S. Congress since June 2010 (and a previous version before that). While many media reports acted as though Lieberman’s action was new, it was the same old bill, and in fact no new actions have been taken on implementing the so-called internet kill switch in the U.S. — which, in fact, actually limits the authority to shut down the Internet that the President already has.

But for those panicked that President Barack Obama was planning to shut down the Internet, the Egyptian situation might have been a blessing a disguise. In the same way that “The Net interprets censorship as damage and routes around it,” as Internet pioneer John Gilmore put it in Time magazine in 1993, the Internet is likely to interpret attempts at government control the same way. Even during the week or less that the Egyptian Internet was down, people both inside and outside Egypt were looking for — and found — workarounds.

All these alternative routes to the Internet popped up in less than five days,” said writer Mike Elgan. “The longer the shutdown dragged on, the more new ways to connect went online. It’s now clear that any sustained Internet shutdown could be circumvented no matter what.

Moreover, freedom-of-information advocates — and savvy companies — worldwide will learn from the Egyptian shutdown and construct services intended to circumvent future attempts, pundits said.

“Back before the internet, many of us early computer hobbyists networked on something called Fidonet. It was a simple peer-to-peer network where users’ computers would just call each other at night through their old-fashioned modems, exchange information and then move on. It was slow — e-mail could take a day or two to reach someone under this scheme — but it suggested a way of doing things independent of a centralized authority,” reminisced media theorist Douglas Rushkoff in CNN.

While this might require that we go back to dial-up Internet, it seems clear that the Egyptian incident will act as a wake-up call for anyone concerned about government Internet intervention.



Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: