Feeds

Huawei feeds up flash fish, offers juicy Dorado to storage-munchers

Gen 2 flash array triples in size

Securing Web Applications Made Simple and Scalable

Huawei, the Chinese networking and storage supplier, has tripled the performance and capacity of its OceanStor Dorado 2100 flash array as well as adding 10 gig E and QDR InfiniBand access and thin provisioning. Deduplication is not included though.

The first gen Dorado, which we described here, was a Huawei Symantec box - at the time it had a JV with Symantec. But the second gen box is a pure Huawei product. The gen 1/gen 2 differences can easily be shown in a table:

Huawei G2 Dorado 2100 flash array

Click on image if your eyes need a bigger font

The amount of fast and expensive single level cell flash goes up from a maximum of 9.6TB to 20TB and the addition of alternative enterprise grade cheaper and slower multi-level cell flash (eMLC) results in a 40TB max capacity. The performance has gone up from 135,000 random read IOPS to 600,000, although Huawei doesn't provide the block size or, indeed, say in its statement, that the two IOPS measures use the same block size - perhaps El Reg is getting suspicious and cynical in its old age.

The original 8 x 8Gbit/s Fibre Channel host ports have 10GbitE iSCSI and 40Gbit/s InfiniBand added to them, providing a welcome increase in host connectivity options. The maximum number of supported host connections jumps from 52 to 512. Reading between the lines here, the dual active/active controllers appear to have had a significant X86 power boost.

In the gen 1 product there were seven RAID levels, as the table above shows. Now there are just three: 0, 5 and 10. The mean time before failure rating of 1 million hours plus is unchanged.

What we have here is another all-flash array contender taking on Greenbytes, Kaminario, Nexgen, Nimbus Data, Pyre Storage, Skyera, Solidfire, Violin Memory and Whiptail - and ready and waiting to meet EMC's XtremIO, NetApp's MARS, IBM's TMS, Dell's Fluid Cache and whatever Cisco and HP come up with. The market's beginning to look a little crowded. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.