Feeds

LSI embiggens MegaRAID flash stash

Quadruples port count too

Internet Security Threat Report 2014

LSI has doubled the amount of flash on its MegaRAID card to 1.6TB and quadrupled the number of ports to 16 so the mighty little beast can be used to accelerate servers in hyperscale environments.

The PCIe-connected Nytro MegaRAID cards combine a RAID controller with on-board flash and caching software to provide faster access to hot data. LSI says this card is meant for "scale-out server and storage environments with high disk counts and capacity requirements," mentioning cloud and hosting companies and similar hyperscale environments..

The MegaRAID 8140-8e8i PCIE flash accelerator card has four flash modules and 16 SAS/SATA connections: that's a quadrupling of the available ports. The card "integrates an expander into the architecture to provide scale-out server environments with connectivity for up to 236 SAS and SATA devices through 8 external and 8 internal ports."

LSI says the card's flash can be partitioned three ways:

  • To provide flash speed primary storage for data volumes
  • "For data protection by applying RAID to a defined capacity"
  • To provide a boot drive – which LSI says frees up HDD slots for capacity use

An Advanced Cache Statistics facility provides "diagnostics designed to ensure production environments achieve optimal caching benefits based on their applications and workloads, and provides:

  • Number of I/Os completed from cache
  • Amount of hot data written to cache
  • Total I/O count, for reads and writes, sent by the host
LSI Nytro MegaRAID 8140-8e8i

LSI Nytro MegaRAID 8140-8e8i card

LSI claims the reporting enables users to measure the effectiveness of caching in their set-up.

So far more than 100,000 Nytro PCIe flash cards cards have been shipped since the brand/product was introduced in April 2012. You can see the card at LSI's booth at World Hosting Days taking place this week at Europa-Park in Rust, Germany.

The card should start production shipping in the second 2014 quarter with availability from LSI OEMs and other channel partners. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.