Feeds

Dell and the dedupe appliance conundrum

What's going on?

Beginner's guide to SSL certificates

EMC and Dell using same dedupe hymn sheet

In EMC's letter to Data Domain announcing its takeover bid it included these statements:

The combination of Data Domain’s and EMC’s technologies will provide the basis for the next-generation of disk-based back-up and archiving solutions for customers by providing functionally superior and cost-effective alternatives to tape-based information backup.

Next-generation disk-based back-up and archiving solutions represent key enabling technologies for the build-out and customer use of true high-reliability cloud computing infrastructures for both enterprises’ own virtualized data centers (“private” clouds) and third party providers (“public” clouds).

What does next-generation disk-based back-up and archiving solutions mean?

With reference to the Data Domain bid, EMC's chief blogger, Chuck Hollis, EMC's global marketing chief technology officer, has blogged:

...The more you look at data reduction in all of its various forms, you start to realize that it can play just about everywhere in the extended storage stack: backups, archives, file systems, remote replication, remote caching, primary storage, etc. etc. There’s no single “best approach” simply because there are so many places where dedupe can be intelligently used.

This is starting to echo the Dell second generation dedupe ideas. We can argue that Data Domain isn't going to play outside the backup and archive space in EMC's deduplicating world because this wider near-primary, file and object deduplication spectrum is already being worked on by EMC using Quantum technology and Dell is going to sell it. The Kaeley statement and the DL2000 release make that clear.

Hollis continues his blog, saying:

... it follows that having more different flavors of dedupe technology in your arsenal is a good thing – hence EMC’s interest in Data Domain as well as many other forms of compression, single instancing and data deduplication ... one way of thinking of this proposed acquisition is nothing more than EMC building out our data dedupe portfolio -- and associated orchestation layers -- in much the way as we’ve done before.

... EMC believes that data deduplication – in all of its various and sundry forms – is a very big deal to EMC, our customers and the industry as a whole ... EMC is building a very broad portfolio of data deduplication technologies, just as we’ve done in other areas we think are very strategic. It's a feature that will show up everywhere over time.

Showing up everywhere over time chimes with the statements in the Dell DL2000 release. Can we see the same hymn sheet being used here?

Hollis has previously said that dedupe is a feature. In his blog he reconciles this view with the Data Domain bid thus: "Data deduplication is a feature -- it shows up in many places and many forms, including simple-to-use backup appliances. Placing the right data at the right place at the right time (e.g. Networker, SourceOne, Avamar, Documentum, et. al.) is not a feature, it's a product."

What can we deduce by joining up these EMC dedupe dots? First dedupe is extremely important to EMC and can play in backups, archives, file systems, primary storage, etc. This could be Dell talking, using the same hymn sheet again, and would be identical to Dell's dedupe application spectrum if Hollis had included object storage.

Secondly, EMC is building a broad portfolio of dedupe technologies and these will not be mutually exclusive.

All-in-all the joined-up Dell and EMC dots are telling us that EMC will announce deduping Clariion, Celerra, and maybe enhanced deduping Centera, storage products, using Quantum DXi technology, and Dell will adopt and sell them in the second half of this year. That's if my dot-joining skills are working well. They could be working badly though, and I've just drawn a crock of the stuff that sticks to fans.

Still, some kind of Quantum technology-based deduping product or product set is going to come out of EMC later this year and Dell will adopt and sell it. That's now a given. ®

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.