Feeds

HP dishes up iSCSI infusion for EVA systems

XP kit gets fat cache

Intelligent flash storage arrays

With its storage business on the mend, HP today announced a few additions to its StorageWorks EVA and XP lines.

First off, HP has started touting the "EVA iSCSI Connectivity Option." This lets customers turn an EVA system into a dedicated iSCSI box and means they can tap into data stored on Fibre Channel SANs (storage area networks) via their IP networks. HP pitches the iSCSI support as an option for customers who want SAN benefits but don't want to pay for expensive Fibre Channel HBAs.

Customers can configure two iSCSI EVA system to run in a redundant configuration, HP said.

Also on the EVA front, HP has added support for 4GB host connections in a move that will allow its boxes to take full advantage of existing 4 gigabit switches and HBAs.

HP has shipped a couple of updates for XP system users as well. Customers will now find that the latest batch of EVA systems - 4000/6000/8000 - can sit behind XP boxes and be managed via the same software. In addition, HP has doubled the cache size of XP systems to 256GB for the XP 12000 and to 64GB for the XP10000.

On the tape side of the house, HP kicked up the maximum configuration of the StorageWorks 6000 Virtual Library System to 70 terabytes by adding 500GB drives as an option. It also rolled out the StorageWorks MSL2024 tape library that has 9.6TB of space in a 2U system.

Software fans will find that "Storage Essentials Backup Manager extends its backup reporting capabilities to HP-UX and Linux environments, while HP Storage Essentials Provisioning Manager offers new provisioning capabilities for third-party disk arrays and switches from IBM, Sun, Xiotech, Cisco and QLogic," HP said.

HP has improved its storage business in the last couple of quarters after having a rough run. The company seems so enthused by its progress that it has taken to calling EMC a "boutique" vendor. Easy, fellas. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.