Feeds

Big Blue 'made a move to buy BlueArc'

Storage insider says HDS was buying against the clock

HP ProLiant Gen8: Integrated lifecycle automation

Blocks and Files: HDS was prompted to buy BlueArc because IBM was making a move against the fast filer firm, or so a source says.

Recall that big storage array shipper Hitachi Data Systems had a reseller agreement with BlueArc for some time, and that BlueArc uses HDS disk shelves as backing store behind its hardware-accelerated NAS heads. Then, last month, seemingly out of the blue, HDS pounces on BlueArc and buys the company – with no obvious trigger that we could see.

Now we hear that IBM had been attempting to buy BlueArc with the intention of supplying customers' need for network-attached storage in-house. The N Series of rebranded and resold NetApp FAS storage would go away, replaced by BlueArc's Titan and Mercury products for the mainstream NAS customers, with IBM's existing SONAS (Scale-Out NAS) providing the high-end, scale-out big data filer cover.

It has a pleasing symmetry about it, but is it true? IBM is certainly more acquisitive than HDS and would prefer not to pass on a proportion of customer revenue to NetApp for N Series systems that, truth be told, compete with IBM's SAN arrays (because these are unified storage arrays). Put that together with the lack of an obvious event triggering the HDS acquisition and you can see the logic behind this line of thought.

It is certainly an enticing idea and our source is a good one but absolutely no one – not BlueArc, HDS, IBM or even NetApp – will confirm or deny it. If IBM had snapped it up, it would certainly add to BlueArc's stature, and Big BlueArc would have had a nice ring to it... ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.