Feeds

Data slicer cuts itself off from hardware

Cleversafe serves up software-only licenses

Security for virtualized datacentres

Cleversafe has untied the knot between its data protection hardware and software with a set of software-only licenses for customers wanting to use third-party hardware.

The company's products cut data into slices, using an Accessor server, and distributes them across many dsNet servers or Slicestors in a scheme which can have up to six Slicestors fail from a set of 16 before data is lost. It's said to be more cost-effective than a RAID-and-replication combination, have more data availability than four replicated copies and scale to huge capacity levels.

Cleversafe is selling this to cloud service providers and enterprises. Its latest v2.1 software release adds a few bells and whistles like APIS to connect billing and CRM systems to the dsNet but also makes the dsNet software available on its own.

The company isn't saying it wants to stop selling hardware, but it's interesting that this happens a day after Sepaton says its roadmap includes turning its data protection system into a virtual appliance with a network link to storage that could be in the cloud. There is a lot to be said for a software and hardware company becoming software company; it has a far smaller operation to manage, and software margins are way higher than hardware ones based on commodity components.

This can be seen as part of a trend in which general and niche application storage arrays move first to having Intel controller processors and then, secondly, to the controller software running in connected servers instead of embedded controllers. In a third hollowing-out of the storage company, the software then runs as a virtual machine in a virtualised server and severs all direct links with hardware completely.

Cleversafe software street prices include the Accesser 2.1, with a per-CPU socket costing $4,200, Slicestor 2.1 storage nodes with per spindle pricing; a 4-spindle license costing $3,800 and a 12-spindle one $10,200, and the Manager 2.1 management system costing $7,000 per CPU socket. ®

Internet Security Threat Report 2014

More from The Register

next story
Just don't blame Bono! Apple iTunes music sales PLUMMET
Cupertino revenue hit by cheapo downloads, says report
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Desktop Linux users beware: the boss thinks you need to be managed
VMware reveals VDI for Linux desktops plan, plus China lab to do the development
IBM, backing away from hardware? NEVER!
Don't be so sure, so-surers
Hey - who wants 4.8 TERABYTES almost AS FAST AS MEMORY?
China's Memblaze says they've got it in PCIe. Yow
Microsoft brings the CLOUD that GOES ON FOREVER
Sky's the limit with unrestricted space in the cloud
This time it's SO REAL: Overcoming the open-source orgasm myth with TODO
If the web giants need it to work, hey, maybe it'll work
'ANYTHING BUT STABLE' Netflix suffers BIG Europe-wide outage
Friday night LIVE? Nope. The only thing streaming are tears down my face
Google roolz! Nest buys Revolv, KILLS new sales of home hub
Take my temperature, I'm feeling a little bit dizzy
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.