News

Compaq Delivers New ProLiant Cluster Solutions

Compaq Computer Corp. today announced the availability of its new cluster, the ProLiant CL1850, along with ProLiant disaster-tolerant stretched clusters for Windows NT and ProLiant clusters for SCO UnixWare 7.

The ProLiant CL1850 is a packaged, two-node cluster including a shared RAID storage system. It is available in tower or rack mount versions and is complemented by Compaq packaged service and support offerings. The ProLiant CL1850 is available today for Windows NT with NetWare clusters available in the first quarter of 2000.

For enterprises requiring disaster-tolerant levels of availability, Compaq has announced availability of its stretched clusters for Windows NT 4.0. The ProLiant HA/F500 disaster-tolerant cluster allows for servers and storage components to be separated by up to 10 kilometers and offers a no-single-point-of-failure system to minimize data loss and downtime.

For businesses requiring highly available SCO environments, the ProLiant Clusters for SCO UnixWare 7 solution works with a variety of ProLiant servers to provide the greatest degree of application availability and support from simple two-node to advanced scalable six-node configurations.

Contact Compaq, (800) AT-COMPAQ, www.compaq.com.

About the Author

Scott Bekker is editor in chief of Redmond Channel Partner magazine.

Featured

  • Tamper Protection Now Available to Microsoft Defender ATP Subscribers

    The Microsoft Defender Advanced Threat Protection (ATP) E5 subscription plan now has an optional "tamper protection" security feature, Microsoft announced on Monday.

  • Exploring OCR, a New Way To Get Data into Excel

    Microsoft recently added a new optical character recognition feature to Excel that lets users import data from a photograph taken from a smartphone. Here's how to use it.

  • Microsoft Authenticator App To Get Real-Time Phishing Protections

    Microsoft is working on adding capabilities to its Microsoft Authenticator app to help defeat security breaches enabled by advanced attack techniques, including phishing and man-in-the-middle methods.

  • A Quicker Way To Create Hyper-V Inventory Reports

    If you need to generate Hyper-V inventory reports but don't want the hassle of writing your own custom PowerShell script, here is a shortcut.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.