Feeds

Fujitsu Siemens challenges EMC and NetApp on virtual tape

When is tape virtualisation true tape virtualisation?

HP ProLiant Gen8: Integrated lifecycle automation

Fujitsu Siemens Computers is taking its CentricStor virtual tape appliance to midsize users, introducing two entry-level models with a mere 2.7TB of caching disk each and the ability to connect to one tape library and up to four physical tape drives.

The CentricStor VTA 500 and 1500 appliances manage the process of disk-to-disk-to-tape backup. They look like a tape drive or library to the servers (but several times faster), store the backup volumes on disk cache, and then stage them to real tape in the background.

Because they virtualise the physical tape drives they are useful for backup consolidation, said FSC product marketing director Marcus Schneider. They can look like a Magstar drive to the mainframe, Storagetek to Unix and DLT to Windows, say, while really storing everything on a single LTO library.

The VTA includes tape cloning as standard - it can create two identical copies of the same tape at the same time to avoid relying on a single tape copy for long-term backup. It also automatically checks tape content and condition, consolidating part-full cartridges and replacing those that show signs of going bad.

Schneider said that VTA is "true tape virtualisation". It competes with virtual tape libraries (VTLs) from the likes of NetApp and EMC, but he said that those focus on replacing tape with disk. For example, he said EMC's Clariion VTL can be used with tape, but only by hanging a real tape library off the same backup server and operating it in parallel. That limits its ability to consolidate your backup operations, he added.

"This is not low end," he said, pointing out that even the smallest model - the CentricStor VTA 500 - starts at £86,207. "This is for mid-market companies, with data centres and perhaps 1000 employees, not for people with one tape drive."

He claimed that the big advantage of CentricStor is that it handles everything itself, so there is much less need for manual intervention by storage admins: "People don't have to deal with physical tape any more - that saves a huge amount of money."

Both the new appliances are expandable, the VTA 500 to 22TB of disk and the more powerful VTA 1500 to 173TB. They can connect to servers via ESCON, FICON or Fibre Channel, and appear on the SAN as between 32 and 128 virtual tape drives. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.