Premium Content

Access "Danish tunnel builder Femern opts for DataCore storage virtualisation"

Published: 03 Jul 2013

The organisation overseeing construction of the 18km €5.5bn Fehmarnbelt tunnel between Denmark and Germany has deployed DataCore storage virtualisation software in place of its existing Dell EqualLogic array, cutting disk costs by around 75%. Danish state-owned Femern’s IT systems will be used by up to 150 engineering staff directly, as well as numerous consultants and contractors who need access via VMware ESX to CAD drawings, specifications and workflow systems for the project, which will complete in 2021. In preparation for commencement of construction work on the underwater tunnel and an expected expansion of data, Femern examined its systems and found its existing EqualLogic iSCSI SAN prone to I/O bottlenecks and reaching end of life. Tim Olsson, IT manager at Femern, said the organisation did not consider upgrading the EqualLogic array because of its complexity and the cost of buying disk. “The EqualLogic array was at the end of its life and coming with an increased high price tag," he said. "We didn’t buy another one because it was too complex for our... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

More Premium Content Accessible For Free

  • Spies in the VPN
    CWE_150414_ezine_252.png
    E-Zine

    In this week’s Computer Weekly, the NSA/GCHQ snooping scandal has added to concerns about security of virtual private networks (VPNs) – we find out ...

  • IT Priorities 2014 Special Report
    prem_IT_priorities_2014_FINAL-1.jpg
    E-Handbook

    Computer Weekly editors draw on their expertise to explain the main technology trends for IT in the UK and across Europe in 2014.

  • Detecting the use of TrueCrypt
    RH 3 Davies-1.jpg
    E-Handbook

    This article in our Royal Holloway Information Security series looks at the clues that can point digital forensics investigators to evidence of ...