Feeds

FalconStor changes tack with IPStor v4

Virtualisation gets the Trotsky treatment

  • alert
  • submit to reddit

Internet Security Threat Report 2014

FalconStor is due to announce version 4 of its storage network software IPStor today (11 Feb), yet with a complete lack of the word 'virtualisation', which has almost been airbrushed out of the picture, Stalin-style.

Ross Parker, the company's Northern European sales director, admits that although storage virtualisation was a hot topic a year ago, very few people actually bought it.

The problem was a classic one: as a technology, virtualisation was an answer in search of a question - and it was a question that most companies were not asking. So FalconStor and competitors such as DataCore, Softek and HP have had to rethink, instead coming up with storage management software that just happens to sit on top of a virtualisation layer.

FalconStor now describes IPStor v4 as network storage infrastructure software, though Parker offers the more acronym-friendly 'storage network infrastructure management.'

"It's still virtualisation but with services on top," he says. "What we've had to do is focus on the problems that customers need to address. Now it's where does the technology fit and how do we make it fit?"

Those services therefore include storage failover and replication, data migration, and the ability to simulate a tape library on disk for faster backup. IPStor v4 also enables storage to be pooled according to criteria such as its performance and availability. Data can then be allocated to the class of storage appropriate to its importance or role within the business.

"The problems really are there, but people tend to ignore them or find complex ways around them," Parker says. Virtualisation as an underlying tool is gradually winning converts though: HDS recently signed up to use IPStor to power a data migration appliance, for example.

"Our strength is we can come in and solve one problem, then we have the foundation to solve others," Parker adds. "We'll sell solutions, then we can create new opportunities from those customers with relatively little pain for them." ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.