Feeds

Controller spec means cheaper disk arrays

But it's all a Dell plot, say high-end rivals.

  • alert
  • submit to reddit

Boost IT visibility and business value

The Storage Bridge Bay (SBB) working group (www.sbbwg.org) is to release version one of the SBB spec next week. This defines standard electromechanics for the controller modules that go into stuff such as disk arrays.

In theory at least, it means that you could build an array from different manufacturers' electronics, much like you'd build a PC using PCI cards from whoever.

The spec defines a slot-in canister with hot-plug connectors and saves disk array builders from having to reinvent the wheel, according to Matthew Brisse, a technology strategist from Dell who has been involved in its creation.

SBB modules could be obvious things like SAS, SATA or Fibre Channel controllers for disk arrays, or something more complex such as a Virtual Tape Library module, an iSCSI target, or a RAID controller. You could even have several different modules in the same array, easily upgrade an array with a new controller, or have a reprogrammable module that you download applications to as needed, Brisse said.

Given its interest in commodity storage, it's no surprise to find that Dell is a prime mover behind SBB, along with EMC, Intel, and LSI Logic. A couple of dozen others are also signed, including storage controller companies Adaptec, AMCC and Emulex, and disk array builders EMC, Infortrend, NetApp and Xyratex.

There's a lot of companies not on the list, and although they won't say so on the record, it's clear that at best they see the standard as only of interest to commodity storage vendors (hello Dell...), and at worst as a plot to squeeze the component suppliers until their pips squeak.

"Whenever Dell comes up with a good idea, I'm suspicious," said the marketing director of one high-end disk array maker that's not in the SBB. "This helps Dell cut costs and put pressure on its suppliers, but it helps me how?"

"SBB has three goals - to increase choice, decrease cost, and improve interoperability," said Brisse. "Standard building blocks will allow array builders to invest more in software and solution - that's where the real value is." ®

The essential guide to IT transformation

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
Docker kicks KVM's butt in IBM tests
Big Blue finds containers are speedy, but may not have much room to improve
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Gartner's Special Report: Should you believe the hype?
Enough hot air to carry a balloon to the Moon
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Dell The Man shrieks: 'We've got a Bitcoin order, we've got a Bitcoin order'
$50k of PowerEdge servers? That'll be 85 coins in digi-dosh
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.