Feeds

Mystery hologram disc upstart gobbles InPhase blueprints

Storage biz flickers into life, beams up rival's assets

High performance access to file storage

3D holographic storage upstart hVault has bought assets of crashed rival InPhase and announced it will ship systems in the spring.

hVault, which has a booth at this year's broadcast technology show NAB in Las Vegas, boasted that it is "the leader in holographic archival storage systems". Well, er, yes, because there is pretty much no one else in the market - and the startup has yet to ship a single system as far as El Reg is aware.

The company is going after the archive market, and says holographic media will last for 50 years. hVault reckons its Star Trek-grade media doesn't need replacing unlike magnetic tape. So archive your digital data, forget it, and read it back in 50 years. Nothing else comes close to this purported low cost of ownership.

The NAB hVault profile mentions a 72TB library with any content "accessible in less than 10 seconds". These storage vaults can be configured with up to four drives and 240 holographic disc slots. Multiple library cabinets can expand the disk capacity to 2,140 discs. A 72TB library with 240 slots pegs capacity at about 300GB per disc.

This is presumably the same 300GB Tapestry disk and drive that drove InPhase to its frustrating collapse when it couldn't get the hardware working properly. The drive was supposed to hit 20MB/s transfer rates.

The hVault engineers must think they have the drive problem beat if it has a sales infrastructure in place. The company's website doesn't reveal much about hVault's founders or backers, merely stating: "The core hVault team has decades of combined experience in the archival storage market, including development of the first holographic library system."

Many have tried and many have failed in the holographic tech arena. Whoever is backing the company and running it will have a hell of a task ahead of them. There are no product details and no prices on the radar. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.