Feeds

Violin plays storage world like a fiddle, 140 characters at a time

New marketing bloke teases out slivers of info about new array

Securing Web Applications Made Simple and Scalable

Violin Memory's flash array fightback starts with a present from the Easter bunny: a whole new array.

Violin, you will recall, lost CEO Don Basile after its IPO was followed by deepening losses and falling share prices.

Incoming CEO Kevin DeNuccio has stabilised the ship, refocussed engineering and recruited new executives, one of whom is chief marketing officer Eric Herzog. He joined from a senior marketing position at EMC.

So now we are all watching and waiting for news on the product front. Herzog has made all of us Violin watchers twitch with a tweet:

Violin's new array will run SQL twice as fast and cut server compute loads by 30 per cent, it says; obviously a tasty little marketing amuse bouche from a man who, until recently, had first-hand experience of EMC's XtremIO all-flash array marketing. Is he going to position Violin as a reliable, proven incumbent with EMC's all-flash array as a risky first-generation unproven startup-equivalent?

That apart, we wonder if some of the processing of SQL queries will be carried out inside Violin's flash array, using its server engine? Is this going to be a new twist in the application-aware storage idea?

We might envisage the coming array will use the latest Toshiba NAND; the 19nm stuff. SLC or MLC, or both?

Lots of questions here; Herzog has been asked for more details. His reply was: "Not yet. Will be in touch soon."

Then he went and tweeted a second time, answering one of our questions:

So the new array will, allegedly:

  • Increase Hyper-V writes by 41 per cent
  • Increase SQL reads by 54 per cent
  • Replicate, dedupe and snapshot

Tasty! When Herzog does get in touch with us, Vulture Central's storage desk will pass on the goods. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.