Friday, 22 August 2014 10:05

German synchrotron to use IBM software defined storage


IBM is to provide the German national synchrotron with a storage system capable of handling more than 20GB of data per second.

Deutsches Elektronen-Synchrotron (DESY) operates the PETRA III synchrotron used to examine the internal structure of materials.

"A typical detector generates a data stream of about 5 Gigabit per second, which is about the data volume of one complete CD-ROM per second," said DESY IT head Volker Gülzow.

"And at PETRA III we do not have just one detector, but 14 beamlines equipped with many detectors, and they are currently being extended to 24. All this big data must be stored and handled reliably," said Dr Gülzow.

IBM is to provide DESY with a software defined storage system that can scale to more than 20GB of input data per second, and also provide scientists with high-speed access to stored data.

The system will also be used for the European XFEL X-ray laser that will generate around 100PB per year, which is comparable to the data generated by CERN's Large Hadron Collider.

"IBM's software defined storage technologies can provide DESY the scalability, speed and agility it requires to morph into a real-time analytics service provider," said IBM's general manager of storage and software defined systems Jamie Thomas.

"IBM can take the experience gained at DESY and transfer it to other fields of data intensive science such as astronomy, climate research and geophysics and design storage architectures for the analysis of data generated by distributed detectors and sensors."


Australia is a cyber espionage hot spot.

As we automate, script and move to the cloud, more and more businesses are reliant on infrastructure that has high potential to be exposed to risk.

It only takes one awry email to expose an accounts payable process, and for cyber attackers to cost a business thousands of dollars.

In the free white paper ‘6 steps to improve your Business Cyber Security’ you will learn some simple steps you should be taking to prevent devastating malicious cyber attacks from destroying your business.

Cyber security can no longer be ignored, in this white paper you will learn:

· How does business security get breached?
· What can it cost to get it wrong?
· 6 actionable tips


Stephen Withers

joomla visitors

Stephen Withers is one of Australia¹s most experienced IT journalists, having begun his career in the days of 8-bit 'microcomputers'. He covers the gamut from gadgets to enterprise systems. In previous lives he has been an academic, a systems programmer, an IT support manager, and an online services manager. Stephen holds an honours degree in Management Sciences and a PhD in Industrial and Business Studies.



Recent Comments