IOPS and latency are not related – HDD performance explored

Recently came across this interesting and thought provoking post around IOPS and Latency.

We all know we need to consider IOPS as well as and often more critically than overall storage volume – 10TB of storage can effectively be saturated from a performance perspective but under 1TB of data that is read / written to at a high rate.  This is a message that many people don’t consider when they just say project X or application Y just needs xx GB of storage.

However even with the understanding of the need to assess IOPS required by a solution it is still possible to get caught out if you don’t consider the profile of these IOPS, and the impact of random reads and writes on the actual performance of the drives / array.  Add to this the fact that many manufacturers’ figures for their products are somewhat on the optimistic side and it is very easy to deploy a solution that at first glance appears to meet the performance requirements, but turns out to be very inadequate in practice.

So; of course consider your storage volume requirements, but make sure you pay great attention to the IOPS and latency requirements along with the usage profile. Then carefully design and test the storage solution to make sure it works as expected.

Post can be found here, interesting reading;

http://blog.richardelling.com/2012/03/iops-and-latency-are-not-related-hdd.html

K

Malware everywhere, even on Apples..

Various sources have been reporting on the recent Java hole that enabled malicious individuals to infect upwards of 600,000 Apple Macs that were running the latest, fully patched version of the O/S.

This Java vulnerability was actually known about sometime last year and has been patched on other systems.  Apple in it’s continued, and frankly misguided, belief that it’s systems are safe and don’t need protection like anti-virus software chose not to patch the hole until 100s of thousands of it’s customers had been infected.

The reality is that all consumer computer systems have vulnerabilities and it should be the expected duty of vendors to patch these as quickly as possible to protect their customers and their privacy.

We have all knocked companies like Microsoft for the amount of vulnerabilities and attacks that have occurred against their software, but the reality is that over the last few years Microsoft has made huge progress in producing more secure software, patching in a very timely manner, providing free tools like anti-virus, and working with law enforcement to bring down criminal bot nets.

Apple has avoided many exploits being created as it has historically been such a niche player.  Why create an exploit for a few machines when you can create one for orders of magnitude more?  As Apple has become more successful and there has been an increased uptake of it’s products in office it has become a more interesting and valuable target for criminals to try and exploit any vulnerabilities.

It is time for Apple to pull it’s socks up from a security stand point, and to become both more proactive and transparent in how it deals with issues and helps protect it’s customers.

For us users of any operating system it’s yet another reminder that we should keep our systems patched and run software to protect us from viruses etc.  Oh and not to trust vendors when then tell us their systems are safe and don’t need further protection.

Some detail and commentary on this issue can be found here at the links below;

http://nakedsecurity.sophos.com/2012/04/04/apple-patches-java-hole-that-was-being-used-to-compromise-mac-users/?utm_source=Naked+Security+-+Sophos+List&utm_medium=email&utm_campaign=a6d16b7680-naked%252Bsecurity

http://news.cnet.com/8301-13579_3-57410476-37/apples-security-code-of-silence-a-big-problem/?part=rss&subj=news&tag=2547-1_3-0-20&tag=nl.e703

K