Feeds

Permabit looks to Linux dedupers

Mainstream OEMs signed up or shut off

Secure remote control for conventional and virtual desktops

OEM deduplication software supplier Permabit has built an Albireo version for Linux vendors to use, as the mainstream storage OEM market for its technology is saturated.

Albireo is a software deduplication technology that storage OEMs can use for primary as well as secondary deduplication since its use does not add delay to data reading or writing. BlueArc and Xiotech are two mainstream storage OEMs that have signed licenses to use the technology.

However, Dell is going its own way with deduplication, having bought Ocarina, Compellent is writing its own deduplication technology, HP has its in-house StoreOnce technology, and EMC has its Avamar and Data Domain product sets as well as its Viper project.

NetApp has its in-house ASIS technology. and IBM has Diligent. The mainstream storage array vendor market is thus getting saturated as all the suppliers in it field their own in-house or acquired deduplication technologies, leaving no more room for Permabit.

Albireo Virtual Data Optimizer (VDO) is a turn-key version providing deduplication and compression to standard Linux platforms. Permabit reckons that, with it, "Linux Network Attached Storage (NAS) OEMs [have] the ability to offer the same real-time primary data deduplication... as large storage OEMs."

Tom Cook, Permabit's president and CEO, said: "As the primary data optimisation market has begun to mature, the Linux-based OEMs have realised that they need to implement this technology into their solutions as well, if they want to remain competitive in the storage market.

According to Gartner, the Linux NAS market grew from 6.5 per cent market share based on revenue in 2006 to 17.9 per cent market share based on revenue in 2009. That's a nice trend but we don't know yet what happened in 2010.

Permabit says Albireo slots in neatly and "OEM customers [can] leverage all of the capabilities of their Linux-based storage solutions by continuing to utilise existing Linux applications, file systems, virtualisation features and data protection capabilities."

Deduplication really is becoming just another standard feature of storage arrays. A developing aspect of its use is to deduplicate data when it enters a storage infrastructure and keep it in this anorexic form as it is moved from array to array or from server to server inside the IT infrastructure.

This will help minimise the data's storage and networking footprints. To do that there needs to be a single deduplication data format in use inside an IT infrastructure. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.