Three More to Explore
Three More to Explore I was intrigued by the technology inherent in three other companies, which are not as far along and a bit more complex. I plan on spending some time soon with each of them to get a better understanding of how they work and what they do. But briefly, heres who they are.
Scalent: As server farms have been replaced by racks of server blades, application distribution has become a problem. Dedicating an application to a single appliance can result in wasted cycles and poor resource utilization. Scalent aims to fix all this by virtualizing applications across racks of servers.
Abhia Systems: Today, most companies have an effective storage architecture setup, with a disaster recovery framework from Sungard, EDS and others. But the problem comes when a user or administrator attempts to recover a small piece of data from that secondary or tertiary storage. Its just not easy to find a single e-mail message or database record.
Thats the problem Abhai Systems aims to solve with its Transband Technology for centrally managing secondary storage. The company claims it can provide continuous data protection and instant recovery at the file level without changes to an existing storage infrastructure.
It works by adding a tiny piece of software at every client. The system reads every single bit as its written, and works independent of applications and services. And because the system monitors patterns of bits, not only can it provide instant recovery, but the system can also detect when somethings going horribly wrong.
Theres a lot of math involved, and much of the technology comes out of Stanford. The CEO co-founded Brocade Communications Systems. Im looking forward to exploring the technology more closely, and Ill report back when I do.
Voltage: I ran into these guys at the Demo 2004 conference, where I discovered my old friend Sathvik Krishnamurthy was running the company. These guys are fascinatingtheyve figured out a way to do private key/public key encryption without all the confusing exchanging of certificates.
The company is leveraging a cryptography breakthrough called Identity Based Encryption that uses an e-mail address, IM handle or other unique identifier to secure communications. The technology also came out of Stanford. Again, I expect to spend time with this company soon, and Ill be back with more.
According to Winblad, this can result in a seven to nine times reduction in the number of servers, or blades, deployed. The companys software virtualizes network appliances, routers, Layer 3 switches, load balancers and content switches simply by adding a standard x86 server and Layer 2 switches. Scalent will deliver its first version, running in IBMs BladeCenter platform, within the next few months.