Browse Definitions :
Definition

hyperscale storage

Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.

Hyperscale storage differs from conventional enterprise storage in several ways, notably the following.

  • The sheer scale of the storage space is several orders of magnitude larger in a hyperscale system than in a conventional system (petabytes versus terabytes).
  • Hyperscale storage media typically serve millions of users with only a few applications (sometimes only one), whereas in a conventional enterprise scenario there are often fewer users but more applications.
  • Hyperscale storage has a minimal set of features and may lack redundancy, because the goal is to maximize the raw storage space and minimize the cost.
  • Hyperscale storage tends to be software-defined, focusing on a high degree of automation with a minimum of direct human involvement.

Hyperscale storage is used on the Internet and, to an increasing extent, in database applications. Examples include social media, Webmail, service-provider storage, HPC (high-performance computing), analytics, financial services, fraud detection and monitoring services, weather forecasting, and large government agencies.

This was last updated in April 2013

Continue Reading About hyperscale storage

SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • What is cybersecurity?

    Cybersecurity is the protection of internet-connected systems such as hardware, software and data from cyberthreats.

  • private key

    A private key, also known as a secret key, is a variable in cryptography that is used with an algorithm to encrypt and decrypt ...

  • DOS (disk operating system)

    A DOS, or disk operating system, is an operating system that runs from a disk drive. The term can also refer to a particular ...

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

SearchStorage
  • RAID 6

    RAID 6, also known as double-parity RAID, uses two parity stripes on each disk. It allows for two disk failures within the RAID ...

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • NOR flash memory

    NOR flash memory is one of two types of non-volatile storage technologies.

Close