Feeds

HDS revving AMS

Monterey mid-range storage refresh coming

Securing Web Applications Made Simple and Scalable

The wires are humming that Hitachi Data Systems is going to update its AMS mid-range storage array line with three new Monterey models. We should expect an announcement quite soon.

The AMS - Adaptable Modular Storage - line was introduced in mid-2005 as the successor to the previous Thunder range, with two models: entry-level AMS200 and mid-range AMS300 both sporting 1 or 2 active:passive controllers and mixed Fibre Channel (FC) and SATA drives. A top-end AMS1000 was introduced in mid-2006, along along with iSCSI and NAS support across the range.

The AMS range features three storage tiers - 15K FC, 10K FC, 7.2K SATA, RAID 6 protection against two drive failures, logical cache partitioning so that cache can be set aside for specific applications, virtual storage ports so that multiple hosts can share the 4Gbit/s FC ports, and support for Windows multi-path IO (MPIO) so that if a controller fails read and writes could be redirected to the surviving controller node.

Power-saving drive spin-down was added in September '07.

These AMS machines compete against EMC's Clariion, recently refreshed with the CX4, NetApp's FAS 3000, and HP's EVA.

Word is that there will be straight model upgrades to new AMS2100, AMS2300, and AMS2500 models. The controllers will become active:active, and MPIO will be added to the controller firmware to boost performance. A volume will be able to be accessed by either controller.

With quad-core Xeons available and HDS a fan of intelligent and virtualising controllers, we might expect improvements in host (1024 currently) and LUN (4096 now) support, the addition of 8Gbit/s FC, FCoE support intentions, thin-provisioning, and could possibly hear about SAS drive and solid state drive (SSD) support.

®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.