Feeds

Oh THOSE products, says Dell. Sure we'll sell them if you ask

Semi-secret OEM kit can be yours

Securing Web Applications Made Simple and Scalable

Dell has unveiled new storage appliances and a server it probably won't try to sell to you.

If that state of affairs seems odd, consider that the new re-privatised concern has a global business making kit for original equipment manufacturers. The resulting products end up in all manner of places where vendors need kit backed by a global company. Medical device manufacturers and telcos, for example, are markets Dell targets. Both need kit like servers and storage arrays as components in more complex products, but have little interest in developing such products themselves.

Enter Dell with a willingness to help with customisation and integration, a “we-tested this in the enterprise” spiel and a global one-throat-to-choke proposition.

Technology transfer goes both ways: the new PowerEdge R420xr being shown off this week at the CommunicAsia trade show in Singapore is a shrunken and ruggedised version of the PowerEdge 12G R420 you or I could order from Dell with a click or three. The xr version adds MIL-STD-810G certification and is aimed at telcos who like the idea of putting intelligence and processing grunt out on the network's edge.

Or at you, if you ask Dell for a a server that can cope with uncommonly high temperatures and gritty environments. But you'll need to ask because the product isn't listed on Dell.com

The storage products revealed at CommunicAsia are more anodyne: The Dell PowerVault MD3400, MD3800 and MD3960 series comprise iSCSI-and-fibre-channel-equipped unified storage devices designed to serve as networked storage for database servers that run out of direct-attached capacity. Dell is at pains to point out that this kit is nowhere near as scalable or interesting as its other storage products. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.