SlideShare a Scribd company logo
1 of 13
Download to read offline
1	
  
Workspace Acceleration & Network
Storage Reduction
Shiv Sikand
VP of Engineering
Roger March
Chief Technology
Officer
2	
  
Driven by Semiconductor Design, Video game software, Enterprise software…
Perforce depots: multi-TB+, 100,000,000s+ files
Single workspaces: multi-GB, 10,000s+ files
Users: 1000’s across globe
Digital Assets Growing at Rapid Rate
3	
  
Source: 2012 LaunchM Survey, 524 respondents	

Impact of Increasing Digital Assets:
Survey cites Top File System Problems
44%	

36%	

 36%	

33%	

25%	

18%	

5%	

Slow	
  WS	
  syncs,	
  apps	
  
Bandwidth	
  
Storage	
  capacity,	
  cost	
  
4	
  
Accelerate
workspace syncs	

Remove network
bandwidth bottleneck	

Reduce network disk
space usage	

SLOW	

Syncs	

Vision
5	
  

Network Storage
Network Storage
Workspace C File 1 File 2 File 3
Workspace B File 1 File 2 File 3
Workspace A File 1 File 2 File 3
User A
User B
User C
•  Duplicates	
  file	
  storage	
  for	
  every	
  user	
  workspace	
  
•  De-­‐dupe	
  too	
  slow	
  for	
  fast	
  changing	
  data	
  sets	
  
•  Saturates	
  precious	
  Tier	
  1	
  storage	
  space	
  
•  Under-­‐uAlizes	
  local	
  caching	
  	
  
High	
  Demand	
  on	
  Network	
  Storage
Perforce
SCM Server
File Data
Metadata
File 1 File 2 File 3
6	
  
File Not Yet
Opened
User A
User B
User C
Local Cache
File 2
0 b
File 1
0 b
File 3
0 b
•  Virtual	
  workspaces	
  projected	
  using	
  Perforce	
  db.have	
  table	
  informaAon	
  from	
  fstat	
  	
  
•  100%	
  dynamic,	
  user	
  controlled	
  workspaces	
  
•  Local	
  storage	
  agnosAc,	
  e.g.	
  disk,	
  tmpfs,	
  SSD....	
  
Local Cache
File 2
0 b
File 1
0 b
File 3
0 b
Local Cache
File 2
0 b
File 1
0 b
File 3
0 b
Dynamic	
  Virtual	
  Workspaces
Instantly	
  displays	
  fully	
  populated	
  workspaces
7	
  
Local	
  Caching	
  
Streams	
  actual	
  files	
  on	
  applicaAon	
  /	
  user	
  demand	
  
User A
User B
User C
Local Cache
File 2
0 b
File 1
0 b
File 3
0 b
•  Files	
  can	
  be	
  streamed	
  from	
  main	
  Perforce	
  server,	
  	
  Perforce	
  proxy	
  or	
  Perforce	
  replica	
  
•  TCP	
  streaming	
  protocol	
  avoids	
  tradiAonal	
  NFS-­‐delivery	
  latency	
  
•  2x	
  faster	
  retrieval	
  of	
  cache-­‐warm	
  files	
  due	
  to	
  on-­‐board	
  access	
  
File Not Yet
Opened
File Opened
Read-only
Local Cache
File 1
0 b
File 3
0 bFile 2
Local Cache
File 2
0 b
File 1
0 b
File 3
8	
  
User A
User B
Local Cache
File 2
Local Cache
File 3
0 b
File 2
0 b
User C
Local Cache
File 2
0 b
File 1
0 b
File 3
File 1
0 b
Automa0c	
  cache	
  management	
  stays	
  within	
  storage	
  quotas	
  using	
  LRU	
  algorithm	
  
File 3
File
File 1
File Not Yet
Opened
File Opened
Read-only
Local	
  caching	
  -­‐	
  manages	
  cache	
  quotas	
  
9	
  
Intelligent	
  File	
  RedirecAon:	
  2x	
  faster	
  file	
  access	
  
Reads	

Writes	

Intelligent	
  	
  File	
  Filtering	
  approach	
  
	
  
• Separates	
  reads	
  from	
  writes,	
  stores	
  reads	
  in	
  local	
  
cache	
  
• Modified	
  files	
  automaAcally	
  wriWen	
  to	
  NAS	
  (or	
  
local	
  cache)	
  
	
  	
  
Advantages	
  
	
  
• Gets	
  on-­‐board	
  speeds	
  for	
  reads	
  instead	
  of	
  network	
  
storage	
  	
  
	
  
• Modified	
  files	
  safely	
  stored	
  on	
  network	
  disks	
  
	
  
• Automated	
  -­‐	
  No	
  manual	
  management	
  
Intelligent	
  File	
  Redirect	
  
	
  On-­‐board	
  speeds	
  for	
  reads	
  
	
  
	
  
Network	
  Storage	
  
Local Cache
Read/
Write
Read
-only
Read
-only
Read
-only
Read/
Write
Read/
Write
Read
-only
Read
-only
Read/
Write
Read/
Write
10	
  
User A
User B
Local Cache
Local Cache
File 3
0 b
File 2
0 b
User C
Local Cache
File 2
0 b
File 1
0 b
File 3
File 1
0 b
Newly	
  created	
  files,	
  checked	
  out	
  files	
  saved	
  to	
  network	
  storage	
  volume	
  or	
  kept	
  local	
  
File 3
File
File 2
0 b
Network Storage	

	
  
	
  
	
  
TEMP 1
File Opened
Read/Write
File 1
File Not Yet
Opened
File Opened
Read-only
Intelligent	
  file	
  redirect
11	
  
User A
User B
Local Cache
Local Cache
File 3
0 b
File 2
0 b
User C
Local Cache
File 2
0 b
File 1
0 b
File 3
File 1
0 b
Checked	
  in	
  objects	
  automa0cally	
  purged	
  from	
  write	
  storage	
  
Avoids	
  duplicated	
  files,	
  frees	
  up	
  space.	
  	
  
File 3
File
File 2
0 b
Network Storage	

	
  
	
  
	
  
File 1 TEMP 1
Real-­‐Ame	
  de-­‐duplicaAon	
  	
  -­‐	
  frees	
  space	
  aer	
  Perforce	
  
check-­‐ins
File Opened
Read/Write
File Not Yet
Opened
File Opened
Read-only
12	
  
IC	
  Manage	
  Views:	
  Accelerates	
  Workspace	
  Syncs	
  &	
  Reduces	
  
Network	
  Storage	
  
	
  
IC	
  Manage	
  Views	
  
Network	
  storage	
  usage	
  
reduced	
  by	
  4x.	
  
	
  	
  
Local	
  Caching,	
  
	
  Real-­‐3me	
  De-­‐dup	
  
Zero-­‐Time	
  Sync	
  
Workspaces.	
  
Dynamic	
  Virtual	
  
Workspaces	
  
2x	
  faster	
  file	
  access,	
  
applicaAon	
  speed	
  up.	
  
Intelligent	
  File	
  
Redirec3on	
  	
  
13	
  
IC	
  Manage	
  Views	
  AddiAonal	
  Benefits	
  
•  NAS	
  agnosAc	
  -­‐	
  100%	
  compaAble	
  with	
  exis0ng	
  storage	
  technologies	
  
•  Scalable	
  -­‐	
  Savings	
  increase	
  with	
  number	
  of	
  users	
  and	
  the	
  size	
  of	
  databases.	
  
•  Flexibility	
  to	
  build	
  Workspaces	
  on	
  Demand.	
  SoVware	
  teams	
  can	
  build	
  workspaces	
  
anywhere,	
  avoiding	
  problems	
  and	
  costs	
  associated	
  with	
  disk	
  space	
  alloca0on.	
  
•  Reliable.	
  Handles	
  cache	
  recovery	
  in	
  the	
  event	
  of	
  failures	
  or	
  errors.	
  
•  Designers	
  maintain	
  workspace	
  file	
  control	
  and	
  stability.	
  No	
  manual	
  management	
  of	
  
network	
  cache	
  storage	
  and	
  different	
  versions	
  
•  Reduces	
  load	
  on	
  filers	
  and	
  network.	
  

More Related Content

What's hot

[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate TransportsPerforce
 
Bareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzBareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzNETWAYS
 
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...Denis Kolegov
 
EAS Data Flow lessons learnt
EAS Data Flow lessons learntEAS Data Flow lessons learnt
EAS Data Flow lessons learnteuc-dm-test
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersDenis Kolegov
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersDenis Kolegov
 
2014 CrossRef Workshops: System Update
2014 CrossRef Workshops: System Update2014 CrossRef Workshops: System Update
2014 CrossRef Workshops: System UpdateCrossref
 
Texter blue - gdpr watchdog
Texter blue - gdpr watchdogTexter blue - gdpr watchdog
Texter blue - gdpr watchdogLuis Cabaceira
 
Large scale near real-time log indexing with Flume and SolrCloud
Large scale near real-time log indexing with Flume and SolrCloudLarge scale near real-time log indexing with Flume and SolrCloud
Large scale near real-time log indexing with Flume and SolrCloudDataWorks Summit
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Hari
 
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn RuytenbergPROIDEA
 
HDFS Federation++
HDFS Federation++HDFS Federation++
HDFS Federation++Hortonworks
 

What's hot (13)

[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports[Lucas Films] Using a Perforce Proxy with Alternate Transports
[Lucas Films] Using a Perforce Proxy with Alternate Transports
 
Bareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp StorzBareos - Open Source Data Protection, by Philipp Storz
Bareos - Open Source Data Protection, by Philipp Storz
 
Google File System
Google File SystemGoogle File System
Google File System
 
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...
Covert Timing Channels based on HTTP Cache Headers (Special Edition for Top 1...
 
EAS Data Flow lessons learnt
EAS Data Flow lessons learntEAS Data Flow lessons learnt
EAS Data Flow lessons learnt
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
Covert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache HeadersCovert Timing Channels using HTTP Cache Headers
Covert Timing Channels using HTTP Cache Headers
 
2014 CrossRef Workshops: System Update
2014 CrossRef Workshops: System Update2014 CrossRef Workshops: System Update
2014 CrossRef Workshops: System Update
 
Texter blue - gdpr watchdog
Texter blue - gdpr watchdogTexter blue - gdpr watchdog
Texter blue - gdpr watchdog
 
Large scale near real-time log indexing with Flume and SolrCloud
Large scale near real-time log indexing with Flume and SolrCloudLarge scale near real-time log indexing with Flume and SolrCloud
Large scale near real-time log indexing with Flume and SolrCloud
 
Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)Building Linux IPv6 DNS Server (Complete Soft Copy)
Building Linux IPv6 DNS Server (Complete Soft Copy)
 
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg
"Playing in the Sandbox: Adobe Flash Exploitation Tales" - Björn Ruytenberg
 
HDFS Federation++
HDFS Federation++HDFS Federation++
HDFS Federation++
 

Similar to [IC Manage] Workspace Acceleration & Network Storage Reduction

Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inRahulBhole12
 
Leveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network BandwidthLeveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network BandwidthPerforce
 
Caching Methodology & Strategies
Caching Methodology & StrategiesCaching Methodology & Strategies
Caching Methodology & StrategiesTiệp Vũ
 
Caching methodology and strategies
Caching methodology and strategiesCaching methodology and strategies
Caching methodology and strategiesTiep Vu
 
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...Michael Stack
 
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to AvoidCapacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to AvoidStorage Switzerland
 
POLARDB: A database architecture for the cloud
POLARDB: A database architecture for the cloudPOLARDB: A database architecture for the cloud
POLARDB: A database architecture for the cloudoysteing
 
Exploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptExploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptMohammedHdi1
 
exploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptexploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptAmitavaRoy49
 
EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functionssolarisyougood
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functionsxKinAnx
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSandeep Patil
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Trishali Nayar
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale finalJoe Krotz
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Amazon Web Services
 
Pithos - Architecture and .NET Technologies
Pithos - Architecture and .NET TechnologiesPithos - Architecture and .NET Technologies
Pithos - Architecture and .NET TechnologiesPanagiotis Kanavos
 
Kscope 2013 delphix
Kscope 2013 delphixKscope 2013 delphix
Kscope 2013 delphixKyle Hailey
 

Similar to [IC Manage] Workspace Acceleration & Network Storage Reduction (20)

The Quick Migration of File Servers
The Quick Migration of File ServersThe Quick Migration of File Servers
The Quick Migration of File Servers
 
Cloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation inCloud computing UNIT 2.1 presentation in
Cloud computing UNIT 2.1 presentation in
 
Leveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network BandwidthLeveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network Bandwidth
 
Caching Methodology & Strategies
Caching Methodology & StrategiesCaching Methodology & Strategies
Caching Methodology & Strategies
 
Caching methodology and strategies
Caching methodology and strategiesCaching methodology and strategies
Caching methodology and strategies
 
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...
HBaseConAsia2018 Track1-5: Improving HBase reliability at PInterest with geo ...
 
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to AvoidCapacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
Capacity - Ransomware - Protection - Three Windows File Server Upgrades to Avoid
 
POLARDB: A database architecture for the cloud
POLARDB: A database architecture for the cloudPOLARDB: A database architecture for the cloud
POLARDB: A database architecture for the cloud
 
Exploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.pptExploring the Oracle Database Architecture.ppt
Exploring the Oracle Database Architecture.ppt
 
exploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.pptexploring-the-oracle-database-architecture.ppt
exploring-the-oracle-database-architecture.ppt
 
EMC Data domain advanced features and functions
EMC Data domain advanced features and functionsEMC Data domain advanced features and functions
EMC Data domain advanced features and functions
 
Ioppt
IopptIoppt
Ioppt
 
Presentation data domain advanced features and functions
Presentation   data domain advanced features and functionsPresentation   data domain advanced features and functions
Presentation data domain advanced features and functions
 
Spectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN CachingSpectrum Scale Unified File and Object with WAN Caching
Spectrum Scale Unified File and Object with WAN Caching
 
Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...Software Defined Analytics with File and Object Access Plus Geographically Di...
Software Defined Analytics with File and Object Access Plus Geographically Di...
 
Less01_Architecture.ppt
Less01_Architecture.pptLess01_Architecture.ppt
Less01_Architecture.ppt
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale final
 
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
Integrating On-premises Enterprise Storage Workloads with AWS (ENT301) | AWS ...
 
Pithos - Architecture and .NET Technologies
Pithos - Architecture and .NET TechnologiesPithos - Architecture and .NET Technologies
Pithos - Architecture and .NET Technologies
 
Kscope 2013 delphix
Kscope 2013 delphixKscope 2013 delphix
Kscope 2013 delphix
 

More from Perforce

How to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsHow to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsPerforce
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...Perforce
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Perforce
 
Understanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsUnderstanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsPerforce
 
Branching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessBranching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessPerforce
 
How to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsHow to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsPerforce
 
How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog Perforce
 
Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Perforce
 
Shift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowShift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowPerforce
 
Hybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldHybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldPerforce
 
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterpriseBetter, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterprisePerforce
 
Easier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMEasier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMPerforce
 
How To Master Your Mega Backlog
How To Master Your Mega Backlog How To Master Your Mega Backlog
How To Master Your Mega Backlog Perforce
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Perforce
 
How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure Perforce
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Perforce
 
Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Perforce
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Perforce
 
What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4Perforce
 
Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Perforce
 

More from Perforce (20)

How to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsHow to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning Needs
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
Understanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsUnderstanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPs
 
Branching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessBranching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development Process
 
How to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsHow to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOps
 
How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog
 
Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team
 
Shift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowShift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New Workflow
 
Hybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldHybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated World
 
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterpriseBetter, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
 
Easier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMEasier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALM
 
How To Master Your Mega Backlog
How To Master Your Mega Backlog How To Master Your Mega Backlog
How To Master Your Mega Backlog
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
 
How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
 
Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
 
What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4
 
Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison
 

Recently uploaded

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 

Recently uploaded (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 

[IC Manage] Workspace Acceleration & Network Storage Reduction

  • 1. 1   Workspace Acceleration & Network Storage Reduction Shiv Sikand VP of Engineering Roger March Chief Technology Officer
  • 2. 2   Driven by Semiconductor Design, Video game software, Enterprise software… Perforce depots: multi-TB+, 100,000,000s+ files Single workspaces: multi-GB, 10,000s+ files Users: 1000’s across globe Digital Assets Growing at Rapid Rate
  • 3. 3   Source: 2012 LaunchM Survey, 524 respondents Impact of Increasing Digital Assets: Survey cites Top File System Problems 44% 36% 36% 33% 25% 18% 5% Slow  WS  syncs,  apps   Bandwidth   Storage  capacity,  cost  
  • 4. 4   Accelerate workspace syncs Remove network bandwidth bottleneck Reduce network disk space usage SLOW Syncs Vision
  • 5. 5   Network Storage Network Storage Workspace C File 1 File 2 File 3 Workspace B File 1 File 2 File 3 Workspace A File 1 File 2 File 3 User A User B User C •  Duplicates  file  storage  for  every  user  workspace   •  De-­‐dupe  too  slow  for  fast  changing  data  sets   •  Saturates  precious  Tier  1  storage  space   •  Under-­‐uAlizes  local  caching     High  Demand  on  Network  Storage Perforce SCM Server File Data Metadata File 1 File 2 File 3
  • 6. 6   File Not Yet Opened User A User B User C Local Cache File 2 0 b File 1 0 b File 3 0 b •  Virtual  workspaces  projected  using  Perforce  db.have  table  informaAon  from  fstat     •  100%  dynamic,  user  controlled  workspaces   •  Local  storage  agnosAc,  e.g.  disk,  tmpfs,  SSD....   Local Cache File 2 0 b File 1 0 b File 3 0 b Local Cache File 2 0 b File 1 0 b File 3 0 b Dynamic  Virtual  Workspaces Instantly  displays  fully  populated  workspaces
  • 7. 7   Local  Caching   Streams  actual  files  on  applicaAon  /  user  demand   User A User B User C Local Cache File 2 0 b File 1 0 b File 3 0 b •  Files  can  be  streamed  from  main  Perforce  server,    Perforce  proxy  or  Perforce  replica   •  TCP  streaming  protocol  avoids  tradiAonal  NFS-­‐delivery  latency   •  2x  faster  retrieval  of  cache-­‐warm  files  due  to  on-­‐board  access   File Not Yet Opened File Opened Read-only Local Cache File 1 0 b File 3 0 bFile 2 Local Cache File 2 0 b File 1 0 b File 3
  • 8. 8   User A User B Local Cache File 2 Local Cache File 3 0 b File 2 0 b User C Local Cache File 2 0 b File 1 0 b File 3 File 1 0 b Automa0c  cache  management  stays  within  storage  quotas  using  LRU  algorithm   File 3 File File 1 File Not Yet Opened File Opened Read-only Local  caching  -­‐  manages  cache  quotas  
  • 9. 9   Intelligent  File  RedirecAon:  2x  faster  file  access   Reads Writes Intelligent    File  Filtering  approach     • Separates  reads  from  writes,  stores  reads  in  local   cache   • Modified  files  automaAcally  wriWen  to  NAS  (or   local  cache)       Advantages     • Gets  on-­‐board  speeds  for  reads  instead  of  network   storage       • Modified  files  safely  stored  on  network  disks     • Automated  -­‐  No  manual  management   Intelligent  File  Redirect    On-­‐board  speeds  for  reads       Network  Storage   Local Cache Read/ Write Read -only Read -only Read -only Read/ Write Read/ Write Read -only Read -only Read/ Write Read/ Write
  • 10. 10   User A User B Local Cache Local Cache File 3 0 b File 2 0 b User C Local Cache File 2 0 b File 1 0 b File 3 File 1 0 b Newly  created  files,  checked  out  files  saved  to  network  storage  volume  or  kept  local   File 3 File File 2 0 b Network Storage       TEMP 1 File Opened Read/Write File 1 File Not Yet Opened File Opened Read-only Intelligent  file  redirect
  • 11. 11   User A User B Local Cache Local Cache File 3 0 b File 2 0 b User C Local Cache File 2 0 b File 1 0 b File 3 File 1 0 b Checked  in  objects  automa0cally  purged  from  write  storage   Avoids  duplicated  files,  frees  up  space.     File 3 File File 2 0 b Network Storage       File 1 TEMP 1 Real-­‐Ame  de-­‐duplicaAon    -­‐  frees  space  aer  Perforce   check-­‐ins File Opened Read/Write File Not Yet Opened File Opened Read-only
  • 12. 12   IC  Manage  Views:  Accelerates  Workspace  Syncs  &  Reduces   Network  Storage     IC  Manage  Views   Network  storage  usage   reduced  by  4x.       Local  Caching,    Real-­‐3me  De-­‐dup   Zero-­‐Time  Sync   Workspaces.   Dynamic  Virtual   Workspaces   2x  faster  file  access,   applicaAon  speed  up.   Intelligent  File   Redirec3on    
  • 13. 13   IC  Manage  Views  AddiAonal  Benefits   •  NAS  agnosAc  -­‐  100%  compaAble  with  exis0ng  storage  technologies   •  Scalable  -­‐  Savings  increase  with  number  of  users  and  the  size  of  databases.   •  Flexibility  to  build  Workspaces  on  Demand.  SoVware  teams  can  build  workspaces   anywhere,  avoiding  problems  and  costs  associated  with  disk  space  alloca0on.   •  Reliable.  Handles  cache  recovery  in  the  event  of  failures  or  errors.   •  Designers  maintain  workspace  file  control  and  stability.  No  manual  management  of   network  cache  storage  and  different  versions   •  Reduces  load  on  filers  and  network.