Feeds

Compellent promises fast hot data and cooler temps

Automatically tiering solid state drives

Securing Web Applications Made Simple and Scalable

SAN drive array supplier Compellent is going to offer solid state drive storage (SSD) in its arrays with active and inactive data being transferred to and from the SSDs automatically.

Compellent's SAN software tracks block usage and moves data blocks from slower to faster tiers of storage and back again automatically. Up until now that has meant moving data between tiers of disk drive storage. The SSDs become the fastest tier of storage now supported, and users don't have to be concerned with which data gets stored in the SSD storage tier.

Fellow drive array startup Pillar Data recently announced its support of SSDs, using Intel technology. Compellent is using STEC drives, the same ones that are being shipped by EMC in its drive arrays and will support 146GB ZeusIOPS SSDs packaged in a twin-drive minimum configuration. They can be fitted into existing Compellent Fibre Channel enclosures without needing any system downtime, in a kind of plug-and-go operation.

There should be the usual benefits of very much faster access to hot data, reduced data centre power draw, cooler array operation and a reduction in rackspace needed to store hot data where many Fibre Channel drives have been used to obtain the transactional speed needed.

Bruce Kornfeld, Compellent's marketing VP, said: "In our virtualized SAN it’s just like any other drive... we don’t lock customers into specific models or require them to buy a lot of drives to make SSD work.” The SSDs will be previewed at Compellent's annual C-Drive customer event in May with availability in the second quarter of this year. Pricing will be revealed at product launch time. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.