Feeds

Quantum lands early de-duplication punch

EMC, NetApp lurk in their corners

Application security programs and practises

Tape survivor Quantum today ramped up its efforts in disk storage with the release of kit aimed at the primed market for de-duplication.

Quantum's pitch is that as a backup appliance, its new DXi-series should slot into established backup setups more easily than wholly software-based solutions. The boxes can be implemented as network-attached storage in Windows and UNIX-based environments, and as a virtual tape library with either a fibre channel or iSCSI connection.

De-duplication has been a hot area of late, with EMC and NetApp buying up de-duplication software developers Avamar and Topio. Quantum can be assured its larger rivals are working on integrating the technology into their appliances too.

Quantum's kit uses software picked up in its acquisition of ADIC in August this year, and was one of the motivations behind the deal. The announcement is the first product the two single companies couldn't have developed on their own.

The gear is punted at mid-sized storage operations looking for an economical backup plan; Quantum claims its technology will slash capacity requirements by 20 times on average.

The eight DXi-series models, which run to 216TB, will be available in the US in January and worldwide from February starting at £12,000. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.