Video Storage: Take a Big Byte

Blog Date:  10/2/2012
Author:  Ray Coulombe

Terabytes, petabytes, exabytes, zettabytes, brontobytes...what’s our security world coming to? When you combine the trends of more surveillance cameras, higher bandwidth requirements, fatter bandwidth pipes and the continuing decline in storage costs, you get near-exponential growth in bytes stored. The question is, how do we manage this vast amount of video data? I’ve discussed this question with several large-scale storage vendors recently and learned some very interesting things.
First, there are well-developed content management systems available; however, managing “regular” data is different from managing video data — particularly streaming surveillance video. Whereas enterprise data consists mainly of small random blocks that are primarily reads rather than writes, video data are large blocks of data that are written far more than they are read. Further, you must organize the files and handle Metadata (tags) that go beyond date and time — a task that VMS and video storage vendors deal with on a regular basis.
This helps explain why those that can tag — such as analytics providers, and high volume storage providers — regularly seek to partner with VMS suppliers, who are the gateway between users and the external storage connected to the network (NAS, DAS, SAN). Innovation and implementation success occurs around these relationships. The manner in which the information is marked, cataloged, and shipped off to storage will directly affect the ease and speed of pulling it back out for review.
Most video is stored for a limited period (usually less than 30 days). It could be the user’s situation or needs do not demand anything longer, but the decision may also be driven by storage costs. In a prior product generation, the digital tape “jukebox” was an answer to long-term archival — now, tape may be back. New entrants to the industry, such as Crossroads Systems, working with tape library provider Spectra Logic, promote a technology based on LTFS (Linear Tape File System) to create a storage center that sits on the network, looks like a network device, holds a ton of video, and costs about 80 percent less than hard drives, with better reliability, higher density, and less energy consumed. Tape capacity is similar to SATA drives, 1.5 or 2.5 TB.
When provisioning storage, take a long look at Total Cost of Ownership (TCO), as well as performance and redundancy. Consider not only acquisition costs, but electrical usage, heat generation, space requirements and expandability.A petabyte (PB) is 1000 trillion bytes (1000 TB) of data, and a storage system for this much data costs $750,000 to $2 million vs. $200,000 for a tape-based system. In case you were wondering, a brontobyte is a trillion PB (27 zeroes).
Link to Complete Article as it appeared in Security Technology Executive Magazine

 

Resource Blogs

Most Recent Blog List for Blog Author: Ray Coulombe

Security Specifier Blog List Image for  Stay Safe! While Traveling This Summer

Stay Safe! While Traveling This Summer

It’s summer vacation time! The last thing you need to worry about it is getting your identity stolen while you’re sitting on a beach somewhere exotic. In 2016, more than 15 million Americans were victims of identity theft, up 16 percent from the previous year, according to Experian. Plus, about 33 percent of that fraud took place when people were traveling. Here’s a few tips to staying safe all summer while traveling...
read more -->

Security Specifier Blog List Image for Rethinking Cabling

Rethinking Cabling

Cat 5e became an ANSI/TIA/EIA standard in 2001, Cat 6 in 2002, and Cat 6a in 2008. However, it may be extremely useful to consider taking advantage of other existing cabling infrastructure in lieu of running new. Read more to learn how to approach cabling.
read more -->

Security Specifier Blog List Image for Off the Beaten Path at ISC West

Off the Beaten Path at ISC West

This year at ISC (the International Security Conference and Exposition), I was determined to try to see the latest iStechnologies hiding in the nooks and crannies—literally! I visited booths in the back, the basement, small kiosks hidden inside larger vendor books, and throughout the Emerging Technology Zone.

In case you missed the show, I’ll round up some of the best new technologies and companies to keep an eye on. Read more.
read more -->

Security Specifier Blog List Image for Cyber Crime Taking Down Cities

Cyber Crime Taking Down Cities

Earlier this year, in March, the City of Atlanta’s nearly 8,000 employees heard words they never thought they would hear: “It’s okay to turn your computers on.” Their computers were powered off for five days. In those five days Atlanta residents could not pay traffic tickets, water bills, or report city issues. Read how ransomware impacted this metropolitan area.
read more -->

Security Specifier Blog List Image for A Few Thoughts on K-12 School Security

A Few Thoughts on K-12 School Security

There is no one size fits all when it comes to K-12 school security. Schools vary in so many ways: size, age, local environment, affluence, culture, governance, and more. Read some helpful tips and resources that might just help your school be better prepared.
read more -->


Copyright Ⓒ 2010 SecuritySpecifiers™
>