Browse Definitions :
Definition

hyperscale storage

Hyperscale storage is the storage of vast quantities of information in media capable of increasing in size rapidly, efficiently, and indefinitely. In a data center, hyperscale storage capacity commonly runs into the petabytes.

Hyperscale storage differs from conventional enterprise storage in several ways, notably the following.

  • The sheer scale of the storage space is several orders of magnitude larger in a hyperscale system than in a conventional system (petabytes versus terabytes).
  • Hyperscale storage media typically serve millions of users with only a few applications (sometimes only one), whereas in a conventional enterprise scenario there are often fewer users but more applications.
  • Hyperscale storage has a minimal set of features and may lack redundancy, because the goal is to maximize the raw storage space and minimize the cost.
  • Hyperscale storage tends to be software-defined, focusing on a high degree of automation with a minimum of direct human involvement.

Hyperscale storage is used on the Internet and, to an increasing extent, in database applications. Examples include social media, Webmail, service-provider storage, HPC (high-performance computing), analytics, financial services, fraud detection and monitoring services, weather forecasting, and large government agencies.

This was last updated in April 2013

Continue Reading About hyperscale storage

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • walled garden

    On the internet, a walled garden is an environment that controls the user's access to network-based content and services.

  • potentially unwanted program (PUP)

    A potentially unwanted program (PUP) is a program that may be unwanted, despite the possibility that users consented to download ...

  • plaintext

    In cryptography, plaintext is usually ordinary readable text before it is encrypted into ciphertext or after it is decrypted.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • Remote Direct Memory Access (RDMA)

    Remote Direct Memory Access (RDMA) is a technology that enables two networked computers to exchange data in main memory without ...

  • storage (computer storage)

    Data storage is the collective methods and technologies that capture and retain digital information on electromagnetic, optical ...

  • storage medium (storage media)

    In computers, a storage medium is a physical device that receives and retains electronic data for applications and users and ...

Close