Feeds

Microsoft stirs storage waters with backup beta

Partners go silent

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

Microsoft's storage division has pulled off a rare feat by making a beta version of a new product available on time.

Microsoft managed to deliver the controversial Data Protection Server in the "early part of 2005" as promised by putting the beta up for download today. However, Microsoft didn't deliver Data Protection Server at all - but rather the newly named Data Protection Manager (DPM).

Microsoft first discussed DPS, er, DPM last September. The software runs on a Windows 2003 Server box and handles basic file server backup tasks. The software is meant to give smaller customers a quicker, easier way than tape to manage backups. This is a natural follow on to the base storage operating system Microsoft has delivered in recent years.

The controversial bit about the product is that it steps on the toes of Microsoft partners such as Veritas, CA and EMC. Some companies such as CA have said they're not really all that bothered by Microsoft's presence in the data protection racket, while other companies like Veritas are notably silent on the subject. In this case, silence speaks volumes.

For the moment, DPM isn't much of a threat. It's pretty low-end, only works with Windows servers and, heck, isn't even on the market. Microsoft plans to remedy that last bit in the second half of 2005, selling the software for under $1,000 per server.

Like most Windows backup products on the market, DPM will look for file changes on servers and then backup those changes to a central disk. Customers can typically pull up this archived data off disk much quicker than with tape. Data that needs to be held over the long haul still goes to tape, but DPM can handle the far more common short-term recovery requests. In addition, DPM gives companies a Windows management GUI they are familiar with.

The third-party software makers like CA and Veritas can build tools that tap right into DPM and any serious customer will likely stick with third-party gear in the near future.

There's more on DMP available here. ®

Related stories

Microsoft launches mini-attack on data back-up market
$5m daily fine beckons for bad boy Microsoft
The post-PC era is upon us
EMC aims 'switcher' campaign at Veritas users
Veritas retools its Backup Exec baby

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.