LeftHand Upgrades iSCSI Software, Targets HP ProLiant Servers
LeftHand just introduced its SAN/iQ 6.6, an enhanced version of its software for building iSCSI-based SANs.
LeftHand Networks has come up with a new way to repurpose old Hewlett-Packard ProLiant DL380 servers: Turn them into iSCSI SAN storage modules.
LeftHand on Monday introduced its SAN/iQ 6.6, an enhanced version of its software for building iSCSI-based SANs. It includes a new user interface that gives a single view for managing tiered SATA, iSCSI and SAS clusters, as well as more templates and wizards to increase storage automation, said Karl Chen, vice president of marketing and development at the Denver-based company.
LeftHand also made SAN/iQ 6.6 available so that solution providers can sell it to customers for use with HP ProLiant DL380 servers. By integrating SAN/iQ with the DL380, customers get a full-featured iSCSI target array with clustering, three-way replication, thin provisioning and synchronous replication, all for about $11,750 plus the cost of the server, according to Chen.
"To get a similar function, you'd need an HP EVA or an EMC CX500, which might cost $60,000 to $70,000," he said. "But you wouldn't have thin provisioning."
Thin provisioning enables a storage administrator to allocate more capacity to a specific application or user than is physically available, under the assumption that not all of those applications and users will need the entire allocated space simultaneously. That allows extra physical capacity to be installed at a later date as the total amount of space actually used approaches the storage device's capacity.
Often, the cost of the required server is nothing. "We're seeing a lot of customers move to blade servers or consolidate their servers using VMware," Chen said. "This is a great way for customers to repurpose existing hardware."
The software gives solution providers flexibility in bringing iSCSI storage arrays to customers, Chen added. "They don't need to buy new boxes and stuff them with hard drives," he said. "And they don't need to figure out how much capacity they need early."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.