NexuStorage says blocks and files can come from object storage – Blocks and Files – Blocks and Files

NexuStorage’s Nexfs software serves block and file data from an object-backing store using sub-file chunking to reduce data movement and help data tiering, and claims great tier-one storage cost savings and good performance.

It has devised Nextassert software to do this without traditional data mapping indices, relational or NoSQL databases, manifests, stub files or symlinks. The company is a nine-month-old founder-funded startup based in New Zealand, and briefed a virtual IT Press Tour on its technology

Founder Glen Olsen, an ex-product manager at DataCore-acquired Caringo, said his Nexfs technology removes the gap between the worlds of file and block storage on the one hand and object storage on the other, with the object storage either on-premises or in the public cloud. Nexfs delivers, he said, a unified, intelligent, cost-effective, massively scalable, data-lifecycle-enabled, storage system that can provide an up to 95 per cent reduction in primary storage capacity. 

The software runs on industry-standard servers and is available as a no-charge, downloadable Community Edition, with subscription-based, SLA-backed support coming soon.


Nexfs is a file system. It splits files into chunks of between 1MB and 8MB in size and stores these chunks on three tiers of media: fast SSDs, slower SATA disk drives, and slower-still object storage. Nexfs presents data through either block or file interfaces, with iSCSI, NFS and SMB/CIFS interfaces supported. There is no direct access to the underlying object storage, although an open source web proxy providing S3 access is on the roadmap.

NexFS diagram ProxyEgg NexuStorage says blocks and files can come from object storage – Blocks and Files - Blocks and Files
Blocks & Files diagram.

Chunks are placed on the hot, warm or cold tiers according to their access profile or personality and can be moved up or down a tier by a SmartTier function. This background process uses low and high tide so-called watermarks to decide if and when and how aggressively to move data between the tiers, with object storage regarded as the infinitely scalable back-end. Its migration of data between tiers can be triggered by file closure, a change in a file data chunk, and/or according to a set time schedule.

SmartProtect automatically copies data in the hot tier to the cold object tier and also copies POSIX file metadata to the hot tier and to the object tier. This means primary data is still available after a drive or system failure.

SmartClone puts cloned copies of files on an object storage tier for protection or distribution. If a single client changes part of the file, the changed chunks are unique to that client. 

The actual storage hardware can be local drives on servers, a SAN, or on-premises object stores — for example, from MinIO, Cloudian and Scality, and AWS. The object access method is S3.

Because the underlying file data is chunked, its access time is lower than that needed for a full file access. Chunks from a file can reside on different tiers:

Nexfs sub file chunking diagram ProxyEgg NexuStorage says blocks and files can come from object storage – Blocks and Files - Blocks and Files

In effect a chunk is an object, and sets of chunks make up a file or, in the block case, a volume. There can be millions of chunks, and mapping their location on the storage drives and their relationship with their parent file is what the Nextassert software accomplishes.


NexuStorage claims its sub-file chunk technology with Nexassert allows massive multi-terabyte sized files to be stored in the cloud or object storage and treated as though they reside on traditional block storage.

Olsen said data mapping indices, databases or manifests are a performance bottleneck and can cause data loss if they are corrupted or destroyed. Nextassert sidesteps both problems.

Nexassert slide ProxyEgg NexuStorage says blocks and files can come from object storage – Blocks and Files - Blocks and Files

He said: “This works because we don’t have a data location index and Nexfs can actually calculate where the data is.” Nexassert patent-pending software can (apparently) directly locate and access data belonging to a single file that resides on different storage classes without maintaining a separate index or manifest. How? We don’t know.

Olsen’s LinkedIn profile says he has filed a patent called “Addressing file data chunks over a REST interface without maintaining a file data chunk database, index or manifest.” We haven’t been able to find any more details than this.

It seems to us that the Nextassert technology will be crucial to the delivery of Nexfs’s performance and scalability. 

NexuStorage company

Glen Olsen is the founder, funder and CEO of NexuStorage. Development has been done by up to 50 external contractors. This is the typical Silicon Valley startup business model, and it’s not unusual according to him. The entire time at Caringo, he said, “I was … a contractor. I was never actually a permanent employee. And to be honest, over time, 90 per cent of Caringo’s work force was the same — they were all contractors.They had very few permanent employees.” 

He said NexuStorage is a pre-revenue company and, once it starts earning revenue, then it may have permanent employees.


Open source Ceph provides file, block and data access using an underlying object store.

Pavilion Data provides block, file, and object access from its all-flash hardware, claiming it’s the most performant, dense, scalable, and flexible storage platform in the universe.

StorONE provides file, block and object storage on the same drives, supporting all drive types — NVMe, SAS, SATA SSDs and HDDs — in the same server.

NexuStorage will need to have advantages not shared by these products to make headway in the market.


This is a courageously funded startup with unique software technology that effectively includes data lifecycle management and could provide an effective way of reducing primary storage usage. We’ll watch its progress with interest.

Source of this news:

Related posts:

EDITOR'S PICK: Overview of Main Rules of SERP Scraping - PC Tech Magazine
Sooner or later, specialists who deal with web data face a problem related to collecting the URLs from Google. The problem is mainly related to constant IP bans, as a result of Google’s methods to de...
Top 8 Ways to Fix Microsoft Store Freezing on Windows 10 - Guiding Tech
The issue mostly occurs when the user selects Settings or clicks on Downloads and updates to check app updates on the Store.While Microsoft is aware of the issue, Microsoft Store is being re...
MECHANIC TALK WITH MIKE: Use CloudFlare to speed up your business article - Goshen News
There are three key elements who will be important when finding a hosting server for your business website: speed, security and scalability. The best website can boost website positioning, impro...
Attackers Scanning for Exchange Servers Vulnerable to ProxyShell - Decipher
Following the release of details last week about three vulnerabilities in Microsoft Exchange, attackers have begun scanning for vulnerable servers, and there are tens of thousands of them online. The...
Take care of Power BI Desktop logon issues - TWCN Icon News
Power BI is one of the most popular Visual images tools created by Microsoft. It is really powerful and is a great ally for almost all businesses. Nevertheless , according to many users, they are ...
Bing or google quietly committed to Silenced No longer be protections for all employees quick Protoc...
Matt cutts employees who have signed concealment clauses can easily still talk with reference to assault, harassment, discrimination along with retaliation they experience with my job, the comp...
Keep getting redirected to security checks, recaptcha, and chrome errors - Virus, Trojan, Spyware, a...
Hey there, I posted in the windows 10 forum and was asked to post here as I may have a stronger piece of malware on my computer. Here is my original post and the FRST.txt log and Addition.txt lo...
Chinese language APT group IronHusky exploits zero-day Windows Server freedom escalation - ARNnet
Credit: Dreamstime One of the vulnerabilities patched by Microsoft has been spotted by a Chinese cyber-espionage organization since at least August. Unquestionably the attack campaigns targ...
Spamhaus Botnet Threat Update: Q3-2021 - Spamhaus
Q3 has seen a massive 82% rise in the number of new botnet command and controllers (C&Cs) identified by our research team. They have observed an explosion in the use of backdoor malware with nefa...
A flexible proxy utility- Local HTTP/HTTPS/SOCKS proxy server - Multiple proxy protocol support- Built-in DNS server supports DoH/DoT upstream and fake IP.- Rules based off domains, GEOIP, IPCIDR or ...
Computer. js was vulnerable to a good solid novel HTTP request smuggling technique - The Day to day ...
Very poor line termination and barbare parsing of chunk renforcement exposed one of two HRS defects The maintainers coming from all Node. js have patched two HTTP request smuggling (HRS) vul...
How AI & proxies drive web scraping -
As public online data acquisition becomes increasingly important to decision-making, AI, web scraping and proxies will continue to find their way into business activities. While the inclusion of AI i...
New-fangled Payment Data Stealing Spyware and adware Hides in Nginx Action on Linux Servers how to p...
Commerce en ligne platforms in the U. S i9000., Germany, and France came under attack from a new malware that targets Nginx servers in an attempt to masquerade have any presence and slip ago de...
Discord login unblocked - TechnoChops
We all love Discord because it gives us an interactive online ground where you can meet and greet our friends and make a series of memories with them. Don’t let the distance get in the way of your fr...
Unable to remove proxy server - Virus, Trojan, Spyware, and Malware Removal Help - Ble...
Hi there, I hope I can get some help on this issue as I have tried everything I can . I am stuck with this proxy server which I cannot remove. I have tried in rege...
To the south Florida 100: COVID injection problems and Capitol developing riots - South North caroli...
Angelo Castillo, commissioner, Pembroke Pines Last week: Our state's refusal to find common shreded is a dysfunction fueled and also an inability to accept almost any common sets of evidence...
Mobile Proxies: What You Need To Know -
Proxies are the connective tissue that makes the world wide web an expansive, safe, and feature-filled place. If it weren’t for proxies, not only would connections between clients and servers be slow...
Secure Web Gateway vs VPN vs Proxy vs CASB: What's the difference? - TechRadar
Cloud computing has been around for over two decades and more and more businesses are choosing the cloud over on-site servers because of its scalability, cost-effectiveness, and overall business effi...

IP Rotating Proxy Onsale


First month free with coupon code FREE30