Feeds

SAS is storming SCSI, claims array maker

LSI Logic goes SAS-only for SMB arrays

Internet Security Threat Report 2014

Serial-attached SCSI (SAS) is fast taking over from parallel SCSI, claimed LSI Logic as it launched a range of SAS-only storage systems aimed at small and mid-sized businesses (SMBs).

"We expect to ship more SAS silicon this quarter than SCSI," said LSI product marketeer Rip Wilson.

Wilson said that LSI, which recently bought chip company Agere, chose to go SAS-only with the new boxes because of its experience with the technology, which replaces traditional parallel SCSI cabling with a serial version similar to Serial-ATA (SATA).

"We were there when SAS was specced out, and we dominate the SAS chip market," he claimed. "We are the only company that can ship everything in SAS, from chips through controllers to disk arrays."

He said the new SAS-only arrays would fill a gap in LSI's portfolio between its RAID controllers and its high-end arrays.

Simplicity aims to replace storage internal to servers with an expandable external storage system that can be shared by several servers. It can have from one to four disk modules, each with 12 SAS drives, and one to three SAS host ports per controller.

There's around 8 million SMBs world-wide who will need to move from internal to external storage in the not too distant future, according to LSI product marketeer Rip Wilson. Many of them are running clustered Windows systems, and Microsoft has announced it will no longer qualify internal storage for use with its cluster software, he added.

"It's probably more for mid-size than small, but if your applications require performance, you really need external storage - you can only get so much performance out of internal storage," he said.

LSI said that future models would support additional host interfaces and SATA drives too, for cheaper but lower performance bulk storage applications.

Wilson added that the Simplicity arrays would ship with "simple and intuitive storage management software", making it possible to implement and run without needing a dedicated storage administrator.

However, SMBs are still likely to find it challenging to migrate their apps and data from internal storage to centralised and consolidated storage on an external array, even with the help of software tools. ®

Internet Security Threat Report 2014

More from The Register

next story
Docker's app containers are coming to Windows Server, says Microsoft
MS chases app deployment speeds already enjoyed by Linux devs
IBM storage revenues sink: 'We are disappointed,' says CEO
Time to put the storage biz up for sale?
'Hmm, why CAN'T I run a water pipe through that rack of media servers?'
Leaving Las Vegas for Armenia kludging and Dubai dune bashing
'Urika': Cray unveils new 1,500-core big data crunching monster
6TB of DRAM, 38TB of SSD flash and 120TB of disk storage
Facebook slurps 'paste sites' for STOLEN passwords, sprinkles on hash and salt
Zuck's ad empire DOESN'T see details in plain text. Phew!
SDI wars: WTF is software defined infrastructure?
This time we play for ALL the marbles
Windows 10: Forget Cloudobile, put Security and Privacy First
But - dammit - It would be insane to say 'don't collect, because NSA'
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.