Feeds

VMware ships disaster recovery and testing software

Plopped into two new management bundles

Intelligent flash storage arrays

VMware this week continues to campaign against human-on-virtual machine interaction with the shipment of two new products in its data center management and automation portfolio.

The vendor is also offering the fledgling code with two management bundles being introduced along with this week's release.

Site Recovery Manager makes an official debut now, although VMware has been pre-promoting the code since last year. It expands on disaster recovery software currently in VMware Infrastructure 3, allowing users to create and test disaster recovery configurations in an isolated environment before pushing them onto a critical system.

Also new to the management lineup is Stage Manager, another product that VMware has been talking up while it's been simmering in beta. Stage Manager puts a similar virtual spin on installing, testing and deploying new applications.

Customers create isolated replicas (or as VMware calls them, "shadow instances") of production systems to roll new apps through the application development process. VMware claims performing this often lengthy and complicated process in a virtual server rather than a physical machine not only makes for a more realistic copy of an in-use systems for testing but also saves money on acquiring hardware.

Both products are available separately, or tied into two bundles that VMware is introducing today.

Package one is the VMware Management and Automation bundle, which includes Stage Manager, Site Recovery Manager, plus the previously released Lifecycle Manager and Lab Manager. The bundle is priced at $4,000 per two processors.

Package two is the IT Service Delivery Bundle. It's the same as the Management and Automation offering, with the exclusion of Site Recovery Manager from the package. It goes for $3,000 per two processors.

The two bundles can be ordered from distributors, resellers and OEMs on May 19. Each management application can also be purchased a la carte. ®

Beginner's guide to SSL certificates

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.