Feeds

Avere punches up file access with 2 more accelerators

Get those filers moving faster

HP ProLiant Gen8: Integrated lifecycle automation

Suffering from slow file access speeds? Avere has introduced two faster and more scalable filer accelerators.

Its FXT accelerators are multi-tiered and clusterable nodes placed in-line in front of filers, and storing data I/Os in the most appropriate media, from DRAM, NVRAM, through flash, SAS and SATA disk, to accelerate random and sequential read and write I/Os to the backend filers.

Avere says its FXT nodes can provide "a 5:1 reduction in disks, power and rack space" compared to files offering the same level of performance – and could cost up to 50 per cent less than such filer configurations.

The FXT 3000 and 4000 nodes and their AOS (Avere Operating System) double the node count in an FXT cluster to 50, and provide maximum cluster capacity of 7TB of DRAM, 150TB of flash, and hundreds of terabytes of disk capacity.

The nodes can be placed close to servers, with filers across a WAN link, so as to reduce file access latency. This has an obvious extension to the FXT nodes front-ending cloud-based filers.

The FXT 3200 has 96GB of DRAM, 4.8TB of SAS disk storage, six 1GbitE ports and two copper 10GbitE ports. The larger FXT 3500 has 144GB of DRAM, and 9TB of SAS disk storage.

The FXT flash-based 4200 has 96GB of DRAM and 1.6TB of solid state drive capacity; while the FXT 4500 provides 144GB of DRAM and 3TB of flash.

These compare to the existing FXT 2000 series; the FXT 2750 with 72GB DRAM, 2GB NVRAM, and 512GB Flash SSD, and the FXT 2550 with 72GB DRAM, 2GB NVRAM and 3.6TB SAS disk.

The latest release of AOS provides analytic tools to monitor and manage an FXT cluster and its activity, which include:

  • The ability to create, save and export customisable graphs and graph sets;
  • "Click and grab" graph manipulation tools, such as sliders that allow users to move through selected periods, and pan and hover capabilities;
  • Comparisons of multiple statistics, such as performance and latency, on the same time axis;
  • Comparisons of a single statistic at multiple time points; and
  • Histograms and heat maps.

The FXT 3000 Series starts at $72,500 and the FXT 4000 Series at $99,500.  Both products are available within 30 days. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.