Feeds

Permabit looks to Linux dedupers

Mainstream OEMs signed up or shut off

3 Big data security analytics techniques

OEM deduplication software supplier Permabit has built an Albireo version for Linux vendors to use, as the mainstream storage OEM market for its technology is saturated.

Albireo is a software deduplication technology that storage OEMs can use for primary as well as secondary deduplication since its use does not add delay to data reading or writing. BlueArc and Xiotech are two mainstream storage OEMs that have signed licenses to use the technology.

However, Dell is going its own way with deduplication, having bought Ocarina, Compellent is writing its own deduplication technology, HP has its in-house StoreOnce technology, and EMC has its Avamar and Data Domain product sets as well as its Viper project.

NetApp has its in-house ASIS technology. and IBM has Diligent. The mainstream storage array vendor market is thus getting saturated as all the suppliers in it field their own in-house or acquired deduplication technologies, leaving no more room for Permabit.

Albireo Virtual Data Optimizer (VDO) is a turn-key version providing deduplication and compression to standard Linux platforms. Permabit reckons that, with it, "Linux Network Attached Storage (NAS) OEMs [have] the ability to offer the same real-time primary data deduplication... as large storage OEMs."

Tom Cook, Permabit's president and CEO, said: "As the primary data optimisation market has begun to mature, the Linux-based OEMs have realised that they need to implement this technology into their solutions as well, if they want to remain competitive in the storage market.

According to Gartner, the Linux NAS market grew from 6.5 per cent market share based on revenue in 2006 to 17.9 per cent market share based on revenue in 2009. That's a nice trend but we don't know yet what happened in 2010.

Permabit says Albireo slots in neatly and "OEM customers [can] leverage all of the capabilities of their Linux-based storage solutions by continuing to utilise existing Linux applications, file systems, virtualisation features and data protection capabilities."

Deduplication really is becoming just another standard feature of storage arrays. A developing aspect of its use is to deduplicate data when it enters a storage infrastructure and keep it in this anorexic form as it is moved from array to array or from server to server inside the IT infrastructure.

This will help minimise the data's storage and networking footprints. To do that there needs to be a single deduplication data format in use inside an IT infrastructure. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.