Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
DATA 
CORRUPTION 
In Video Surveillance Storage
WHAT IS DATA CORRUPTION? 
Data corruption occurs when a bit or a set of 
bits is changed unintentionally due to variety of...
WHY VIDEO SURVEILLANCE? 
The probability of a silent data corruption 
occurring is proportional to the number of writes 
b...
HAPPENS MORE OFTEN THAN YOU 
THINK 
CERN study found 1 in every 1500 files to have 
data corruption.
CAN BE POTENTIALLY 
DEVASTATING 
Up to 10% of catastrophic storage system 
failures have been linked to silent corruption ...
END-TO-END CHECKSUMS 
Unlike a simple disk block checksum, end-to-end 
256-bit checksum, stored as metadata 
separate from...
COPY-ON-WRITE 
When data is changed, blocks containing active 
data are never overwritten — the data is always 
written to...
NEXT GENERATION FILE SYSTEM WITH 
BUILT-IN PER-BLOCK CHECKSUMMING, 
SELF-HEALING ERROR CORRECTION 
AND ATOMIC COPY-ON-WRIT...
Upcoming SlideShare
Loading in …5
×

Data corruption-in-video-surveillance

380 views

Published on

Data corruption occurs when a bit or a set of bits is changed unintentionally due to variety of reasons: hardware errors, data transfer noise, software bugs, many more … The probability of a silent data corruption occurring is proportional to the number of writes being done. A heavy write-intensive application such as video surveillance recording is more exposed than an average email server. Silent data corruption happens more often than you think, - CERN study found 1 in every 1500 files to be corrupted. It can be potentially devastating, - up to 10% of catastrophic storage system failures have been linked to silent corruption of data , according to white paper by NEC. Next generation file system with built-in per-block checksumming, self-healing error correction and atomic copy-on-write snapshots will protect your mission critical surveillance recordings against silent data corruption.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Data corruption-in-video-surveillance

  1. 1. DATA CORRUPTION In Video Surveillance Storage
  2. 2. WHAT IS DATA CORRUPTION? Data corruption occurs when a bit or a set of bits is changed unintentionally due to variety of reasons: Hardware errors Data transfer noise Software bugs Many more …
  3. 3. WHY VIDEO SURVEILLANCE? The probability of a silent data corruption occurring is proportional to the number of writes being done. A heavy write-intensive application such as video surveillance recording is more exposed than an average email server.
  4. 4. HAPPENS MORE OFTEN THAN YOU THINK CERN study found 1 in every 1500 files to have data corruption.
  5. 5. CAN BE POTENTIALLY DEVASTATING Up to 10% of catastrophic storage system failures have been linked to silent corruption of data, according to white paper by NEC.
  6. 6. END-TO-END CHECKSUMS Unlike a simple disk block checksum, end-to-end 256-bit checksum, stored as metadata separate from the data it relates to, will detect all forms of silent data corruption such as misdirected reads and writes, phantom writes, DMA parity errors, driver bugs and accidental overwrites as well as traditional "bit rot."
  7. 7. COPY-ON-WRITE When data is changed, blocks containing active data are never overwritten — the data is always written to a new block and checksummed, ensuring that data is always consistent on the disk.
  8. 8. NEXT GENERATION FILE SYSTEM WITH BUILT-IN PER-BLOCK CHECKSUMMING, SELF-HEALING ERROR CORRECTION AND ATOMIC COPY-ON-WRITE SNAPSHOTS WILL PROTECT YOUR MISSION CRITICAL SURVEILLANCE RECORDINGS AGAINST SILENT DATA CORRUPTION. Copyright © 2014, Lucid Technology, Inc. Lucid Technology is democratizing enterprise-class storage by making high-performance and extensive feature-set accessible in a cost effective and affordably priced appliance, that’s immune to silent data corruption.

×