Feeds

Data Domain soups up products

Mid-range and entry-level refresh

HP ProLiant Gen8: Integrated lifecycle automation

Data Domain has replaced its 500-series mid-range and 120 entry-level deduplication products with new ones.

Data Domain is a subsidiary of EMC and manufactures deduplicating storage arrays. They carry out an in-line process deduplicating incoming data as it lands on the box rather than afterwards. The company is riding Intel's processor performance curve to steadily boost the performance of its products, and uses four-socket, quad-core Xeons in its range-topping DD880 box.

Starting at the bottom, the remote office and entry level DD120 product becomes the DD140 with twice the capacity at 1.5TB raw storage, and 50 per cent more aggregate backup throughput at 450GB/hour.

The mid-range was the Data Domain 500 series. It has been replaced at its upper end already with the DD580 giving way to the quad-core DD660 in March this year, following on from the introduction of the DD690 in May 2008. Both use quad-core Xeon processors to boost performance.

That left the DD500 series rump as the 565, 530 and 510. The 530 and 565 are replaced by the DD630, with 12TB raw capacity from its 1TB drives, and a 1.1TB aggregate backup throughput. The 510 is replaced by the DD610 with 6TB of raw capacity from 500GB drives, and 675GB/hour throughput.

This refresh would likely have been planned before EMC bought Data Domain. We still expect a new round of processor upgrades with 4- and 6-core Nehalem processors being adopted to raise performance further.

It is also expected or hoped that Data Domain will introduce global deduplication across members of its DDX arrays which currently deduplicate independently from each other.

The DD630, DD610 and DD140 are available immediately. No prices were revealed. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.