Feeds

Just who is the mystery gobbler of flash upstart GridIron?

And did they pay $300m for the TurboCharger maker?

Security for virtualized datacentres

GridIron Systems, a SAN accelerating startup, has been bought by a mystery buyer for an unknown amount.

The company builds the TurboCharger, a DRAM and flash cache box with software to automatically move the most-wanted data from the backing SAN into its cache store. GridIron's TurboCharger is also bundled with NetApp's E-Series E5400 arrays.

NetApp may want a similar supply deal for its fabric-attached storage arrays using its acquired CacheIQ technology as part of its storage clustering MARS project.

GridIron's Prasad Pammidimukkala, veep for product management and business development, was asked about the acquisition of GridIron and replied: "I will get back to you shortly - I can't comment at the moment." That's not a "no comment", then.

The news was first revealed by Scality's director of product strategy Philippe Nicolas, who speculated that a price of between $200m and $300m was involved.

The likelihood is that GridIron has been swallowed by a mainstream storage vendor looking to compete with all-flash and hybrid flash-hard disk drive SAN arrays. That would mean the list of possible buyers could include Dell, EMC, HDS, HP and NetApp. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.