Scality Intros Object Based RING Organic Storage

Scality has introduced its new object-based approach to storage, RING Organic Storage. RING is composed of a number of nodes that are typically off-the-shelf generic x86 servers with direct attached storage. The RING software links the nodes together.

The RING operates like a peer-to-peer network, with no need for a master database. Each node is functionally equivalent and constantly monitors a number of its peers. This object-based approach to storage means that organizations can replace nodes as required without affecting application functionality. As storage requirements increase, and as newer, lower-cost hardware becomes available, new servers can be added or modified to the RING. If a server fails or an old server is removed from the system, no manual intervention is required. When servers are added or removed from the system, RING automatically rebalances replicas and server loads.

RING Organic Storage allows for virtually unlimited scalability. Another challenge is that traditional storage area network (SAN) and network attached storage (NAS) systems become obsolete after a few years and must be replaced in their entirety. RING enables organizations to upgrade storage hardware incrementally, which reduces costs and eliminates down time.

Further information about RING Organic Storage can be found on Scality's site.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.