Sun unveils low-end storage system

Sun Microsystems has announced a storage system that brings some high-end features for protecting data to the low end of its...

Sun Microsystems has announced a storage system that brings some high-end features for protecting data to the low end of its storage line.

Sun will start shipping the StorEdge 3300 Series systems in mid-October. The storage servers will fit under Sun's StorEdge 9900, 6900 and 3900 Series systems, and are designed to provide a data store for low-end and mid-range servers, said Mark Canepa, executive vice-president of storage at Sun.

Storage has been one of the weaker parts of Sun's hardware line-up, analysts have said, but the company has worked hard to revamp its storage systems.

The StorEdge 3300 Series will start at just less than $7,000 (£4,444) for a five-drive, just a bunch of disks (JBOD) system. Higher-end features available on some models in the 3300 Series include level 3 Network Equipment Building Systems (NEBS) compliance - related to how well the system can withstand disasters such as earthquakes and fires - and configurations that include single to dual redundant array of independent disks (RAID) controllers, Canepa said.

Systems start at $13,000 (£8,254) with a single RAID controller.

"Some of our customers like the more mission-critical or rugged types of capabilities we can provide," Canepa said. "They feel good in terms of putting it to work in areas where a traditional white box type of system might not be enough."

The StorEdge 3300 was built to store data used by servers running on one to eight processors, Canepa said.

The system will also ship with a Web-based graphical user interface (GUI) for controlling management tasks.

Sun will support its own Solaris and Sun Linux operating systems as well as Microsoft's Windows 2000 and NT operating systems and Red Hat's Linux OS.



Enjoy the benefits of CW+ membership, learn more and join.

Read more on Integration software and middleware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.




  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...