Feeds

Storage virtualisation back on the menu

This time it's really fit for use, says DataCore

Application security programs and practises

Storage virtualisation is finally going mainstream, DataCore Software has claimed, as it limbers up for a major new release of its flagship SANsymphony app later this week.

The new software - SANsymphony Enterprise Edition 6.0 - includes several significant features, such as virtual SANs, iSCSI/Fibre Channel agnosticism, continuous data protection, and QOS (quality of service) support.

DataCore CTO and chairman Ziya Aral described it as "the first half of our Virtualisation II strategy," and added: "It lays the architectural foundation for our future."

Storage virtualisation technology - which turns disk drives and arrays into a pool of storage blocks which can be reassembled, replicated, and mirrored into logical volumes on a SAN - has been around for several years. However, while it has had success in some niche apps such as data migration and disaster recovery, it has been seen as too complex for routine storage management.

Now, though, that appears to be changing. The advent of virtual server software, able to automatically provision compute resources, has got managers interested in doing the same with storage resources - and that's one of the things storage virtualisation can supply.

"We run DataCore in tandem with VMware and together they allocate resources as needed, where needed, over our IP and Fibre Channel networks," said Michael Gayle, IT director at Calvary Chapel and an early adopter of SANsymphony 6. "Instead of wrestling with hardware, SANsymphony has made storage a network utility - a service for our users and applications."

"The timing couldn't be better, as we see 2007 as the year storage virtualisation goes mainstream," added eponymous analyst Arun Taneja, of the Taneja Group.

To meet the needs of Calvary Chapel and others, DataCore and rivals including FalconStor, Softek (recently bought by IBM), and StoreAge (now owned by LSI Logic), have all been working on technologies such as thin provisioning - providing a server with a virtual volume that only takes up physical disk space as it actually uses it - and automated, self-optimising storage.

Aral said having already added the former in previous versions, it's the latter that is a key feature in SANsymphony 6.

"Many of the changes involved in the Virtualisation II platform are internal and will remain largely invisible to the user," he said. "What is readily visible, however, is a new level of transparency and integration, grouped operations, and automated management."

In particular, he highlighted automation and the ability to apply policies and operations to multiple storage resources in one go; virtual SANs which let sets of resources be assigned to projects or business units; and SAN agnosticism, which allows Fibre Channel and iSCSI SANs to be logically merged, with fail-over possible from one to the other. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.