Feeds

NetApp - just like perfection?

Behind the scenes in storage Disneyland

Securing Web Applications Made Simple and Scalable

"Now we'll have a unified name space over the whole file system and no one will have to hold (physical addresses)," Warmenhoven said. "This is not about scaling out for performance; it's scaling out for manageability. It's virtualisation of data locality... present the name of the object and we'll go and find the volume."

It's not that NetApp customers can't get this global name space feature already. Isilon for example offers it but that's outside the NetApp stockade. ONTAP 8 will bring it inside the fence.

It was 20 years ago today

Warmenhoven thinks storage is now at the stage networking was 20 years ago, when "you probably had purpose-built switches for Ethernet (and the other different interfaces). Along came the router and the different interfaces became line cards. The core of data management and data storage is not dissimilar to the router."

Just as a unified router dissolved the need for switches purpose-built for different network applications, so unified storage can dissolve the reasons for having different storage technologies for separate storage apps.

"We do believe that the right solution is to move away from purpose-built products for each storage application and move to a single model."

EMC's coming Celerra update embodies this approach - to an extent. It offers a NAS interface alongside its iSCSI and Fibre Channel SAN interfaces and it can deduplicate data and function as an archive. Thus it overlaps Symmetrix and Clariion arrays and Centera archive storage - but those other product lines won't go away.

Still, NetApp believes they should, that the same core product technology should operate within the various storage personalities, that you have your fairground ride, your enchanted castle, your canoe flume ride, all operating together and integrated.

It's all about continuity. Buy one NetApp product and get to know it. Buy another and it works and is managed pretty much the same way. Buy another and you don't have to learn much new at all as NetApp continuity wraps you inside its warm blanket. Filers or block access devices, primary storage or secondary storage - all just different personalities, skins around the same constant NetApp onion.

The continuity even extends to Warmenhoven's own future. He's starting his 15th year as NetApp CEO and says: "I'm older than the hills (he's 58) and I do not expect to be the CEO of this company when I'm 60... There's a point at which a new leader is needed." Tom Georgens, president and chief operating officer, is identified as the probable next CEO, "as long as he continues the executive leadership". Can you detect the whip held by the velvet glove there?

In fact, NetApp is even better than Disney World; it has a plan for what happens when the top man goes - which Disney didn't. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.