Feeds

EMC slices and dices Centera into 'virtual pools'

More app friendly

  • alert
  • submit to reddit

Intelligent flash storage arrays

Hoping to advance its technology lead over rushing rivals, EMC this week rolled out a series of software updates for its Centera system that help customers get more out of the box.

EMC has delivered the most notable Centera additions by releasing Version 3.0 of the CentraStar operating system. This release brings "virtual pool" technology for divvying up information on a Centera box and also new data replication tools. Add in a few more options for chargeback and search functions and EMC has stacked Centera well to compete against new boxes from the likes of HP, StorageTek and Sun Microsystems.

"We're not announcing a future here," said Roy Sanford, a vice president at EMC. "We're actually delivering it."

Sanford rightly points out that Centera belongs to that rare class of system that gives a vendor room to boast. EMC more or less defined the CAS (content addressable storage) market, figuring out early that customers would look for disk-based systems to store unchanging data. This allowed EMC to get a jump on the market and make up for some of its more embarrassing "we're announcing a future but not delivering" moments.

Customers who already bought the Centera sales pitch will likely warm to the virtual pool idea that makes it more practical to store data for a number of applications on a single system.

In the past, Centera didn't have a clean means of separating one application's information from that of another. This wasn't a huge problem since most customers were storing information from a single app - e-mail, for example - on the box. Recently, however, more customers have moved to use one Centera box with more than one app, which has in turn made replicating or searching for data tough. Basically, the same rules applied to all the apps even if the customer might want them to govern just one.

Now customers can have an application see only the data that belongs to it.

"When e-mail archives are stored into Centera, we keep that e-mail archive information in a virtual pool inside a Centera cluster and separate that from other data in the cluster," Sanford said.

Savvy administrators can also set up different permissions for each "pool" of data. That's a nice option for a company that needs to guarantee one department isn't peeking at the information from another group. It can also help with governance checks - a must in today's rubber glove culture.

When not getting virtual, EMC hunkered down on replication functions for Centera. Version 3.0 goes beyond the boring one-to-one past to permit replication from numerous sites to a single, central archive. In addition, customers can link together three or more systems to replicate data in a type of chain - this being a requirement for some companies in Europe looking to keep up with Basel II.

Away from CenteraStar, EMC released Version 3.5 of its Centera Universal Access package that lets third-party applications connect into Centera systems. The software now scales better - up to 200m objects - and will run on a box qualified to slip into a Centera rack.

Last but not least, EMC has released Version 1.1 of both its CenteraSeek search software and Chargeback Reporter software. The latter package works with the new virtual pools. ®

Related stories

StorageTek wants to fix your content with IntelliStore
Mimosa ships all-knowing Exchange protector
EMC finally finds its virtual voice
EMC cheapens Centera with bite-sized box
EMC puts a super-Google in Centera boxes

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.