Feeds

Dell fattens disks in D2D backup product beef-up

Still struggling to pry shareholders' mitts off company

HP ProLiant Gen8: Integrated lifecycle automation

Dell has fattened up its DR4000 disk backup target array. The newer, bigger, fatter little brother is called the DR4100 and has bigger disks, more of them, plus faster server engines and more backup software certifications.

The DR4000 used Dell's acquired Ocarina deduplication and compression technology and was announced just over a year ago.

The DR4100 uses Dell's 12th generation PowerEdge servers to give it more performance and the base 2TB drive component has had its capacity upped to 3TB.

Dell DR4100 and DR4000

Dell DR4000 and DR4100 compared

After RAID 6 the capacity range for the DR4000 was 2.7TB to 18TB. That for the DR41000 is 2.7TB to 27TB plus up to two disk expansion shelves which can hold up to 27TB each, providing a maximum capacity of 81TB, a more than 4X increase. Logical capacity, after Ocarina software has worked its magic, goes up from the DR4000's 270TB to 1.2PB with the DR4100.

The set of certified backup software products supported has expanded to include CA, Oracle and Dell's acquired Quest. The number of remote sites that can have a central site act as a disaster recovery facility has increased from five to 32. The DR4000 could ingest data at up to 5.38TB/hour, but Dell has not provided any updated figure for the DR4100.

Quantum's latest DXi6802 can ingest data at up to 16.3TB/hour and have up to 156TB of raw capacity.

Dell is currently in the midst of a well-publicised attempt to go private but, while this goes on, new product development continues. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.