Feeds

BlueArc puts replication on a diet

Thin replication

HP ProLiant Gen8: Integrated lifecycle automation

Hardware-accelerated filer supplier BlueArc has stopped replicating useless data with its latest software release.

Replication involves sending copied storage data to a nearby or remote storage array for disaster-recovery protection. The JetMirror feature of version 8 of BlueArc's System Software is claimed to replicate large and complicated file systems up to 26 times faster than unnamed competing products. It only sends changed objects across the network instead of complete files. The product can also skip empty blocks. BlueArc says JetMirror is "more intelligent" than general block-level replication and can be faster.

The v8.0 software includes JetClone functionality to create cloned copies of file systems using writable snapshots and storing later changes separately. This approach uses much less storage than making full-sized clones. BlueArc says there is a virtually unlimited capability to create cloned copies because it has a 256TB file system. This is said to be good news for virtual servers and Virtual Desktop Infrastructure test and development environments. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.