The X1 connected via Thunderbolt.
The X1 attaches to a network and allows file-based applications to archive to LTO external drives, Sony Optical Disc Archive (ODA) drives or cloud object storage. The appliance runs Windows 10 Pro and is powered by XenData Archive Series and FS Mirror software.
The archive appears locally as a single logical drive – the X: drive. And XenData explains that there are multiple ways to write to and restore files from it:
- Share the X: drive over your network and write to it and restore from it like any disk-based share.
- Use FS Mirror to synchronize one or more locally accessible file systems or file shares to the LTO archive.
- Use FS Mirror to create archive drop-boxes on your network that automatically move files to the archive.
- Use third party applications that integrate with XenData’s XML API.
The X1 is available in three models: for LTO external drives, ODA external drives and for cloud. Each model is based on Intel NUC hardware and includes a high-endurance 1.92 TB SSD cache for enhanced performance.
The X1 for LTO connects to an LTO external drive via Thunderbolt 3 or USB 3. And for LTO drives with SAS connections, they may be connected via a Thunderbolt to SAS converter. The appliance manages an unlimited number of LTO cartridges and up to 2 billion files. It enables file transfers that span across cartridges and, when using two or more attached LTO drives, it supports automatic cartridge replication.
The X1 for ODA supports Gen 1, 2 and 3 drives with cartridge capacities up to 5.5 TB. They connect to the X1 via USB 3. As with LTO, the X1 manages an unlimited number of cartridges and it supports file transfers that use the 1.92 TB cache to span cartridges.
The X1 model for archiving to cloud storage supports multiple clouds including AWS S3, Azure and Wasabi S3. The system may be configured to replicate files to different cloud locations and different cloud providers.
The X1 Archive Appliance is immediately available.
You might also like...
Compliance solutions have rapidly transformed a once operator-intensive legal necessity into suites of automatic processes for new revenues.
Computer security is always a hot topic, but what do we mean by security and why do systems seem to be ever vulnerable. Comparing hardware to software helps understand vulnerabilities in software security.
Strategies for capturing immersive audio for scene and object-based audio.
To maintain high quality of experience for their customers, content providers need a way to monitor hundreds—sometimes thousands—of channels without compromising real-time error detection. In most cases, the immense scale of their service offerings makes continual visual monitoring of …
As in all systems where there are opposed ideologies, there is a kind of cold war in which advances on one side need to be balanced by advances on the other. In encryption, the availability of increased computing power at…