From The Blog
-
ConnectWise Slash and Grab Flaw Once Again Shows the Value of Input Validation We talk to Huntress About its Impact
Written by Sean KalinichAlthough the news of the infamous ConnectWise flaw which allowed for the creation of admin accounts is a bit cold, it still is one that…Written on Tuesday, 19 March 2024 12:44 in Security Talk Read 680 times Read more...
-
Social Manipulation as a Service – When the Bots on Twitter get their Check marks
Written by Sean KalinichWhen I started DecryptedTech it was to counter all the crap marketing I saw from component makers. I wanted to prove people with a clean…Written on Monday, 04 March 2024 16:17 in Editorials Read 1566 times Read more...
-
To Release or not to Release a PoC or OST That is the Question
Written by Sean KalinichThere is (and always has been) a debate about the ethics and impact of the release of Proof-of-Concept Exploit for an identified vulnerability and Open-Source…Written on Monday, 26 February 2024 13:05 in Security Talk Read 1100 times Read more...
-
There was an Important Lesson Learned in the LockBit Takedown and it was Not About Threat Groups
Written by Sean KalinichIn what could be called a fantastic move, global law enforcement agencies attacked and took down LockBit’s infrastructure. The day of the event was filled…Written on Thursday, 22 February 2024 12:20 in Security Talk Read 1069 times Read more...
-
NetSPI’s Offensive Security Offering Leverages Subject Matter Experts to Enhance Pen Testing
Written by Sean KalinichBlack Hat 2023 Las Vegas. The term offensive security has always been an interesting one for me. On the surface is brings to mind reaching…Written on Tuesday, 12 September 2023 17:05 in Security Talk Read 2120 times Read more...
-
Black Kite Looks to Offer a Better View of Risk in a Rapidly Changing Threat Landscape
Written by Sean KalinichBlack Hat 2023 – Las Vegas. Risk is an interesting subject and has many different meanings to many different people. For the most part Risk…Written on Tuesday, 12 September 2023 14:56 in Security Talk Read 1838 times Read more...
-
Microsoft Finally Reveals how they Believe a Consumer Signing Key was Stollen
Written by Sean KalinichIn May of 2023 a few sensitive accounts reported to Microsoft that their environments appeared to be compromised. Due to the nature of these accounts,…Written on Thursday, 07 September 2023 14:40 in Security Talk Read 2109 times Read more...
-
Mandiant Releases a Detailed Look at the Campaign Targeting Barracuda Email Security Gateways, I Take a Look at What this all Might Mean
Written by Sean KalinichThe recent attack that leveraged a 0-Day vulnerability to compromise a number of Barracuda Email Security Gateway appliances (physical and virtual, but not cloud) was…Written on Wednesday, 30 August 2023 16:09 in Security Talk Read 2088 times Read more...
-
Threat Groups Return to Targeting Developers in Recent Software Supply Chain Attacks
Written by Sean KalinichThere is a topic of conversation that really needs to be talked about in the open. It is the danger of developer systems (personal and…Written on Wednesday, 30 August 2023 13:29 in Security Talk Read 1876 times Read more...
Recent Comments
- Sean, this is a fantastic review of a beautiful game. I do agree with you… Written by Jacob 2023-05-19 14:17:50 Jedi Survivor – The Quick, Dirty, and Limited Spoilers Review
- Great post. Very interesting read but is the reality we are currently facing. Written by JP 2023-05-03 02:33:53 The Dangers of AI; I Think I Have Seen this Movie Before
- I was wondering if you have tested the microphone audio frequency for the Asus HS-1000W? Written by Maciej 2020-12-18 14:09:33 Asus HS-1000W wireless headset impresses us in the lab
- Thanks for review. I appreciate hearing from a real pro as opposed to the blogger… Written by Keith 2019-06-18 04:22:36 The Red Hydrogen One, Possibly One of the Most “misunderstood” Phones Out
- Have yet to see the real impact but in the consumer segment, ryzen series are… Written by sushant 2018-12-23 10:12:12 AMD’s 11-year journey to relevance gets an epic finish.
Most Read
- Microsoft Fail - Start Button Back in Windows 8.1 But No Start Menu Written on Thursday, 30 May 2013 15:33 in News Be the first to comment! Read 116513 times Read more...
- We take a look at the NETGEAR ProSafe WNDAP360 Dual-Band Wireless Access Point Written on Saturday, 07 April 2012 00:17 in Pro Storage and Networking Be the first to comment! Read 87450 times Read more...
- Synology DS1512+ Five-Bay NAS Performance Review Written on Tuesday, 12 June 2012 20:31 in Pro Storage and Networking Be the first to comment! Read 81993 times Read more...
- Gigabyte G1.Sniper M3 Design And Feature Review Written on Sunday, 19 August 2012 22:35 in Enthusiast Motherboards Be the first to comment! Read 80307 times Read more...
- The Asus P8Z77-M Pro Brings Exceptional Performance and Value to the Lab Written on Monday, 23 April 2012 13:02 in Consumer Motherboards Be the first to comment! Read 70960 times Read more...
Reading time is around minutes.
Thecus® Releases Cutting-Edge D16000 Dedicated for Daisy-Chaining
Taking advantage of technology for massive volume expansion!
08/23/2012- Thecus® is excited to announce a brand new unit specifically for daisy-chaining, now users have the ability to increase volume with the benefits of fast transfers and infrastructure cost savings. Below we’ll go into the concept of daisy-chaining, go into depth on the highly praised D16000 and how this innovative storage device changes the way network storage infrastructure is set up.
Innovative Thecus® D16000 characteristics
For the first time in the storage industry, daisy-chaining technology is put in place by Thecus®. At first glance, the D16000 resembles the N16000 so much that the average user likely won’t be able to tell the difference. However, the device is a total different unit, specifically the internals. First, CPU and RAM cannot be located in the interior as there are no CPU and RAM. What are included in the D16000 are 16-bays, backplane with SAS I/O. SAS SFF-8088 cables are required to link devices together. In a nutshell, the D16000 can be viewed as a large external hard drive coupled to each other for massive volume, hence DAS for (direct-attached storage).
Daisy chain basics
The announcement of implementing daisy chain technology in the Thecus® line of products is a great milestone and brings wonderful advanced functions to the storage industry. A little background, daisy chain is a type of network topology for those that aren’t too familiar with the notion. Network topology is for network administrators to link two or more devices together to transfer data. Daisy chain layout is beneficial to users who often require adding more nodes to the network. In addition, this layout is an easy way to connect nodes together and requires little cable to do so.
Daisy chain in action
To expand volume with daisy chain, one master N16000 unit is required to guide the daisy-chaining, and then users are able to link up to four D16000 as target units. As mentioned earlier, SAS cables are utilized to link the units together to get rapid speeds. With this setup, users are able to obtain massive amount of volume, up to 320TB of storage space! The ability to reach this capacity at a low cost is something new to the industry.
Cost savings with the D16000
Volume per cost is the cream-of-the-crop for the D16000; it’s about half the cost for the same storage capacity. What this means is that the D16000 will list for about half the amount of the N16000 unit or even less, which is a bargain that innovative technology grants with daisy-chaining. Users will get the privilege to utilizes more volume, less cost with daisy chain.
To conclude
The concept of daisy-chaining NAS together is clearly geared towards enterprise level users, with this said, large enterprises that require a vast amount of rackmounts can take advantage of daisy-chain and connect D16000 units for massive volume expansion, with massive amount of cost savings. To add, since SAS SFF-8088 is utilized to transfer data, users can rest assure that transfer speeds is unmatched.
During Computex 2012 in Taipei, the D16000 and daisy-chain setup was put on display. Click on the link provide below to check out specific details on what this innovative setup has to offer. Simply put, “Massive expansion made easy.”
For D16000 and daisy-chain video, go to: http://hexus.net/tv/show/2012/06/Thecus_D16000_and_N16000_NAS_daisy_chained?key=1339153772
For more information on the D16000, go to:
http://www.thecus.com/product.php?PROD_ID=82
For more information on Thecus®, go to: http://www.thecus.com
About Thecus®
Thecus® Technology Corp. specializes in Network Attached Storage and Network Video Recorder solutions. The company was established in 2004 with the mission to make technology that is as transparent as it is easy-to-use and products that are not only the best on the market, but are accessible to experts and novices alike. Combining a world-class R&D team highly experienced in storage hardware and software development with a keen customer focus, Thecus® stays close to the market to develop high-quality products to fulfill the storage and surveillance needs of today’s world.
For sales inquiries, please contact us via email: This email address is being protected from spambots. You need JavaScript enabled to view it.
Latest from News
Leave a comment
Make sure you enter all the required information, indicated by an asterisk (*). HTML code is not allowed.