LeftHand Upgrades iSCSI Software, Targets HP ProLiant Servers - InformationWeek
IoT
IoT
News
News
10/16/2006
07:37 PM
50%
50%

LeftHand Upgrades iSCSI Software, Targets HP ProLiant Servers

LeftHand just introduced its SAN/iQ 6.6, an enhanced version of its software for building iSCSI-based SANs.

LeftHand Networks has come up with a new way to repurpose old Hewlett-Packard ProLiant DL380 servers: Turn them into iSCSI SAN storage modules.

LeftHand on Monday introduced its SAN/iQ 6.6, an enhanced version of its software for building iSCSI-based SANs. It includes a new user interface that gives a single view for managing tiered SATA, iSCSI and SAS clusters, as well as more templates and wizards to increase storage automation, said Karl Chen, vice president of marketing and development at the Denver-based company.

LeftHand also made SAN/iQ 6.6 available so that solution providers can sell it to customers for use with HP ProLiant DL380 servers. By integrating SAN/iQ with the DL380, customers get a full-featured iSCSI target array with clustering, three-way replication, thin provisioning and synchronous replication, all for about $11,750 plus the cost of the server, according to Chen.

"To get a similar function, you'd need an HP EVA or an EMC CX500, which might cost $60,000 to $70,000," he said. "But you wouldn't have thin provisioning."

Thin provisioning enables a storage administrator to allocate more capacity to a specific application or user than is physically available, under the assumption that not all of those applications and users will need the entire allocated space simultaneously. That allows extra physical capacity to be installed at a later date as the total amount of space actually used approaches the storage device's capacity.

Often, the cost of the required server is nothing. "We're seeing a lot of customers move to blade servers or consolidate their servers using VMware," Chen said. "This is a great way for customers to repurpose existing hardware."

The software gives solution providers flexibility in bringing iSCSI storage arrays to customers, Chen added. "They don't need to buy new boxes and stuff them with hard drives," he said. "And they don't need to figure out how much capacity they need early."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll