EMC picks Greenplum Data Computing appliance

Sweet


EMC has launched its Greenplum Data Computing Appliance (DCA), promising twice the performance of Oracle's Exadata system.

The DCA is an online analytical processing (OLAP) engine for looking at business transaction data, mining it, and getting information out of it that can better describe customer behaviour, to help mobile phone suppliers reduce customer churn, losing them to competing suppliers, for example.

It uses Greenplum's massively parallel processing, shared-nothing architecture. A single rack has 16 segment servers inside, each using two Intel Xeon E5670, 6-core, 2.93GHz processors, making 192 Intel cores in total. The rack also has two redundant servers for co-ordination operations; they don't do data mining work.

There can be up to 24 racks, totalling 4,608 data mining cores. A DCA rack has 36TB of usable uncompressed disk space, using 600GB drives. EMC says there is 144TB with compression. The amount of compression varies with the type of data and EMC is using a generalised 4X compression factor.

The DCA is an integrated IT stack system, including database, compute, storage and network resources in a single product. It is available in half-rack, full-rack, and multiple-rack appliance configurations, and scales up to 3.46PB with compression.

Describing it, and not being ironic, Greenplum founder and EMC data products division CTO Luke Lonnergan said: "We don’t need anything esoteric."

He says we are entering an era of big data and massively parallel systems are needed to ingest it, mine (digest) it, and spit out results fast.

Customers can integrate it with EMC's Data Domain deduplicated backup, recovery and replication technologies, for data protection. Replication can also be provided by EMC's RecoverPoint product for disaster recovery.

This hardware runs v4.0 of the Greenplum database and EMC promises "the fastest data loading and best price/performance in the data warehousing industry". One DCA rack can ingest data at 10TB/hour, twice as fast, EMC says, as Oracle's Exadata system, and five times faster than Netezza and Teradata products. Performance scales linearly and a 24-rack system would theoretically ingest data at 240TB/hour.

Lonnergan said: "The strength of the appliance model is that it lands on the floor tested and configured at the point of manufacture, the weakness has been that many of these products are infrastructure islands.

"The DCA can be deployed and operated as a stand-alone Appliance, turn it on and data goes in while decisions come out, but you can connect it to an EMC array if you choose, replicate it with RecoverPoint and back it up to Data Domain.

"You’re now storing the data on your production arrays, getting long distance continuous remote replication with bookmarking and backing it up to deduplication storage with built-in integrity checking and bandwidth-optimised replication… it’s no longer an island in your data centre. It’s part of the infrastructure."

The Greenplum 4.0 database is shipping and available separately as software-only, to be run on X86 hardware, such as, EMC suggests, the Virtual Computing Environment (VCE) coalition Vblock infrastructure packages. The DCA product is available immediately. Pricing was not revealed. ®

Similar topics


Other stories you might like

  • The future: Windows streaming through notched Apple screens

    Choice is the word for Jamf's Dean Hager

    Interview As Apple's devices continue to find favour with enterprise users, the fortress that is Windows appears to be under attack in the corporate world.

    Speaking to The Register as the Jamf Nation User Conference wound down, the software firm's CEO, Dean Hager, is - unsurprisingly - ebullient when it comes to the prospects for Apple gear in the world of suits.

    Jamf specialises in device management and authentication, and has long been associated with managing Apple hardware in business and education environments. In recent years it has begun connecting its products with services such as Microsoft's Azure Active Directory as administrators face up to a hybrid working future.

    Continue reading
  • There’s a wave of ransomware coming down the pipeline. What can you do about it?

    AI can help. Here’s how…

    Sponsored The Colonial Pipeline attack earlier this year showed just how devastating a ransomware attack is when it is targeted at critical infrastructure.

    It also illustrated how traditional security techniques are increasingly struggling to keep pace with determined cyber attackers, whether their aim is exfiltrating data, extorting organisations, or simply causing chaos. Or, indeed an unpleasant combination of all three.

    So, what are your options? More people looking for more flaws isn’t going to be enough – there simply aren’t enough skilled people, there are too many bugs, and there are way too many attackers. So, it’s clear that smart cyber defenders need to be supplemented by even smarter technology incorporating AI. You can learn what this looks like by checking out this upcoming Regcast, “Securing Critical Infrastructure from Cyber-attack” on October 28 at 5pm.

    Continue reading
  • Ransomware criminals have feelings too: BlackMatter abuse caused crims to shut down negotiation portal

    Or so says infsec outfit Emsisoft

    Hurling online abuse at ransomware gangs may have contributed to a hardline policy of dumping victims' data online, according to counter-ransomware company Emsisoft.

    Earlier this month, the Conti ransomware gang declared it would publish victims' data and break off ransom negotiations if anyone other than "respected journalist and researcher personalities" [sic] dared publish snippets of ransomware negotiations, amid a general hardening of attitudes among ransomware gangs.

    Typically these conversation snippets make it into the public domain because curious people log into ransomware negotiation portals hosted by the criminals. The BlackMatter (aka DarkSide) gang's portal credentials (detailed in a ransom note) became exposed to the wider world, however, and the resulting wave of furious abuse hurled at the crims prompted them to pull up the virtual drawbridge.

    Continue reading

Biting the hand that feeds IT © 1998–2021