Feeds

Nirvanix offers cloud taster to nervous customers

Hybrid private/public cloud with outsourcing

HP ProLiant Gen8: Integrated lifecycle automation

Nirvanix will set up a cloud file storage node in your own data centre, federate it to other nodes and provide an on-ramp to its public cloud storage.

The idea is to effectively out-source storage of your large file-based data sets to Nirvanix. It installs and manages a so-called hNode, with "h" meaning hybrid, in your own data centre as your own private cloud, and delivers its services to you in a cloud economics way, meaning pay-for-use.

Nirvanix's marketing director, Adrian Herrera, said: "There is a setup fee and a monthly per GB fee based on the amount of storage. Nirvanix scales the solution as usage grows."

Customers can federate multiple hNodes in several geographically dispersed data centres together, with a global namespace and policy-based replication between them. Policies can also be set up to transfer data to Nirvanix's own cloud, the Storage Delivery Network.

File data in the system can be accessed by CIFS or NFS, the SOAP and REST APIs, and through third-party software from CommVault, Atempo, Arkeia, Gladient, Nasuni, Ocarina Networks, Tarmin, Vembu and others. The minimum configuration is 200TB and this can expand beyond 2PB. It contains all the networking hardware, software and storage needed in multiple racks. The starting network link is 1Gbit/E and this can be scaled up to 10GbitE. Nirvanix says the overall system can support millions of users and billions of files.

It also says this product and service enable customers to store sensitive data that must be retained on-premise in a cloud-like way, and provides the scalability and enhanced data protection of a connected public cloud as well, with users simply seeing a single file storage pool from wherever they happen to be located.

Think of this private cloud hybrid as halfway between running your own large-scale secondary storage for unstructured data and shipping it all off to a public cloud. Use it to build your confidence and then move entirely to a public cloud - if economics, network access speed and service level agreements mean it is practical. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.