The Future of Storage in Container Space: Part 3

It was not that long ago when organizations had in-house servers humming along running applications and storing data. Today, the opportunity afforded by containers means that applications can now live on a cloud platform (either public or private), or one of several available cloud platforms.

But while applications and microservices housed in stateless containers are easy to move from place to place (indeed, that’s a big part of the appeal of containers), the data the applications are accessing are stateful and very, very difficult to relocate while still maintaining consistency, latency, and throughput. This is one of the challenges faced by the Red Hat Storage team, and  addressed by Sage Weil in his recent presentation at Red Hat Summit: maintaining data availability with acceptable latency when working with applications in multi-cloud and hybrid cloud environments.

Continue reading “The Future of Storage in Container Space: Part 3”

The Future of Storage in Container Space: Part 2

In Part 1 of Now + Next’s closer look at the future of container storage, we examined the beginnings of the storage solution with a look at how hardware trends will affect the way storage and containers will evolve together.

In this installment, Ceph Project Lead Sage Weil continues our conversation, moving “up” the stack to software platforms. Specifically, Sage discusses where container technology is now and where it is going.

Continue reading “The Future of Storage in Container Space: Part 2”

The Future of Storage in Container Space: Part 1

The rise of container technology has created a new challenge for the storage industry. Within containers, applications, and computation resources are now incredibly mobile, while storage still has to remain persistent and accessible. Here’s how Red Hat is working to address the storage needs of container workloads.

In modern microservice-based architectures, each container is a transient object. It might live on one server for a while and then get moved over to another if directed by an orchestrator tool. While a container keeps its bundle of application software and dependencies during its lifecycle, it usually does not keep application data within the container. Nor should it. After all, in this model a container is designed to run only what is needed and when it is needed. When done, the container is allowed (in fact encouraged) to disappear. If an application’s data were held inside that same application container, too, then pfft!

That’s a challenge.

Continue reading “The Future of Storage in Container Space: Part 1”

Bringing Automation to Container Space

The wonders of automation have been thoroughly enjoyed by sysadmins in recent years with tools like Ansible enabling rapid deployment of applications and services across servers and cloud-based platforms. But as the IT world evolves to more container-based technologies, tools like Ansible have not translated well to orchestration-level actions.

This is changing rapidly, thanks to the new Automation Broker project. Part of the OpenShift ecosystem, Automation Broker connects the gap between provisioning servers and provisioning containers.

Continue reading “Bringing Automation to Container Space”

Artificial Intelligence Will Be More than an Upgrade

Sitting in the frigid air-conditioned room somewhere under the surface of a tropical island, it soon became obvious that I was very likely the dumbest person in the place. And, if the men and women around me have their druthers, in a few years, I might not be the smartest sentient entity in the room, either.

It wasn’t a mad scientists’ convention, but rather Supercomputing Asia 2018 that brought me to this place on Sentosa in Singapore a couple weeks ago, where engineers, computer scientists, and business people gathered to discuss the trends and technology within the supercomputing realm.

Continue reading “Artificial Intelligence Will Be More than an Upgrade”

Open Source Strength Within Distributed Weakness Filing

If you could visualize the code that comprises our current technology landscape, you might imagine in your mind’s eye a glowing field of interconnected lines with bright bits of information flowing along the lines’ paths. Here and there, you might see flaws in the network–places where human error have introduced gaps and openings among the lines.

Continue reading “Open Source Strength Within Distributed Weakness Filing”