Feeds

Permabit looks to Linux dedupers

Mainstream OEMs signed up or shut off

Remote control for virtualized desktops

OEM deduplication software supplier Permabit has built an Albireo version for Linux vendors to use, as the mainstream storage OEM market for its technology is saturated.

Albireo is a software deduplication technology that storage OEMs can use for primary as well as secondary deduplication since its use does not add delay to data reading or writing. BlueArc and Xiotech are two mainstream storage OEMs that have signed licenses to use the technology.

However, Dell is going its own way with deduplication, having bought Ocarina, Compellent is writing its own deduplication technology, HP has its in-house StoreOnce technology, and EMC has its Avamar and Data Domain product sets as well as its Viper project.

NetApp has its in-house ASIS technology. and IBM has Diligent. The mainstream storage array vendor market is thus getting saturated as all the suppliers in it field their own in-house or acquired deduplication technologies, leaving no more room for Permabit.

Albireo Virtual Data Optimizer (VDO) is a turn-key version providing deduplication and compression to standard Linux platforms. Permabit reckons that, with it, "Linux Network Attached Storage (NAS) OEMs [have] the ability to offer the same real-time primary data deduplication... as large storage OEMs."

Tom Cook, Permabit's president and CEO, said: "As the primary data optimisation market has begun to mature, the Linux-based OEMs have realised that they need to implement this technology into their solutions as well, if they want to remain competitive in the storage market.

According to Gartner, the Linux NAS market grew from 6.5 per cent market share based on revenue in 2006 to 17.9 per cent market share based on revenue in 2009. That's a nice trend but we don't know yet what happened in 2010.

Permabit says Albireo slots in neatly and "OEM customers [can] leverage all of the capabilities of their Linux-based storage solutions by continuing to utilise existing Linux applications, file systems, virtualisation features and data protection capabilities."

Deduplication really is becoming just another standard feature of storage arrays. A developing aspect of its use is to deduplicate data when it enters a storage infrastructure and keep it in this anorexic form as it is moved from array to array or from server to server inside the IT infrastructure.

This will help minimise the data's storage and networking footprints. To do that there needs to be a single deduplication data format in use inside an IT infrastructure. ®

Beginner's guide to SSL certificates

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.