Feeds

SGI flutters onto corpse of Starboard Storage, pecks away at assets

Failed upstart's tech will live on as production spools up again

High performance access to file storage

The Register is hearing that HPC bods SGI have bought the assets of the failed unified file/block access and hybrid array startup Starboard Storage, which crashed and burned in October.

Some Starboard employees are now back at work and the product line technology is set to continue.

What's SGI about here?

Their CEO is Jorge Titinger, who was recruited in February 2012 to replace Mark Barrenechea, whose reign ended in 2011. Titinger said in August this year that SGI's focus is on commercial HPC, Hadoop-style big data systems and the storage systems underlying them.

The major products are its UV 2000 shared memory systems, CE X Xeon clusters, and InfiniteStorage arrays

Previous SGI storage-related acquisitions include FileTek for its StorHouse data management and file virtualisation in October 2013, and crashed Copan for its MAID spin-down disk array technology in February 2010.

StorHouse has big data relevance but Starboard doesn't seem to have had that focus.

In September SGI presented at a Deutsche Bank event and said more about its strategic plan. The company confirmed that its ideas for the future revolved around HPC, big data and storage, with an intent to grow this part of its business 15 per cent in fiscal 2014 to $560m revenue. The pitch made the point that inactive data is left on primary storage and consumes (i.e. wastes) it. Eighty five per cent of primary storage data is inactive, it added, citing Forrester Research.

SGI Storage Strategy

SGI's storage thinking. Click the chart to get bigger image.

From the chart it looks as if the Starboard hybrid array technology could slot in as flash-accelerated file and block storage below its Modular InfiniteStorage HPC arrays, and perhaps becoming a variant in that product line.

Another perhaps is that maybe – just maybe – the acquired Starboard tech will enable SGI to stop using NetApp E-Series controllers in its arrays, giving it control over its controller tech destiny and saving money currently heading to Sunnyvale.

We've asked SGI for comment on what we have heard and got nowhere, a spokesperson saying: "SGI does not comment on rumours or speculation regarding decisions, products, promotions or acquisitions that have not been officially announced."

Not a "no" then. ®

High performance access to file storage

More from The Register

next story
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.