Network Computing is part of the Informa Tech Division of Informa PLC
Imation Scanner Protects Tapes
Tape vendors have been including a little bit of flash in their tape cartridges -- and over hyping the capabilities of that memory -- since Sony added MIC (Memory in Cassette) to AIT-1 in 1996. Imation's Secure Scan extends the real usefulness of the RF accessible cartridge memory beyond identifying unique tapes and tracking error data to securely locking tapes for transport.
The hype is that tape cartridge memory speeds access to backup data. Even if backup software vendors wrote their drivers to save catalog data in the cartridge memory for systems, the limited amount of memory in a cartridge could be used, at best, to store the starting block of each backup job, not the whole catalog of backup files. After all, an LTO cartridge has just 4-8KB of memory while AIT cassettes can hold a whopping 64K.
What's stored in the CM (Cartridge Memory) or the MIC is performance data. For instance, what drive the tape was loaded into, error rates, amount of data read and written to the cartridge, along with what kind generation of tape it is. This speeds up tape loads and prevents an LTO-1 drive from loading an LTO-4 cartridge.
Imation has offered a service for years where their field folks use an RF scanner to collect data from a customer's LTO tapes and run it through statistical analysis software that identifies failing tapes and drives. They're now selling the USB scanner/software combination, for $4,000, so customers can analyze their own tapes. Since the data is collected via RF, scanning tapes is much faster than loading them into a drive to read the tape header. Maxell sells a similar scanner as their "LTO Cartridge Memory Analyzer." The unique twist is that Imation's scanner and software will also modify the data in the MIC so that LTO drives will see the tape as a product they can't load.
So you can take a tape, stick it on the scanner for a few seconds, and LTO drives won't load it until you stick it on a scanner again and enter the right password. Even if someone could rewrite the MIC data to say this was a valid tape, the data wouldn't match the tape header and the drive would reject the tape.
Recommended For You
What skills do network managers really need to properly secure industrial networks? What new protocols, frameworks, and regulations are important? And what conferences and certifications can help? Here are five tips to get started.
A full-stack approach to retail edge offers retailers a way to optimize operations and adapt to changes in a post-pandemic world.
Network management tool sprawl is getting in the way of network management. It’s time for IT to do something about it.