Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs

What is HCI Software?

Truth in IT
10/06/2023
65
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: So Todd, you know, we often think of hyperconverged infrastructure as an appliance and as DCIG's lead researcher into HCI, talk to us a little bit about HCI software, how you guys define it and you know your research into it. Todd Dorsey: Well, the term "hyperconverged infrastructure; HCI" has been around for well over a decade. I think there's some debate upon who first coined the term, but traditionally it's was brought into place to help solve the problems of data center infrastructure management and managing the three pillars of compute and storage and networking independently and separately, which of course introduces its own problems of complexity and cost and scalability and deployment. So we've had these appliances out for well over a decade. But over the years we've seen products introduced to market that are software-only. That is, they have been decoupled from the appliance themselves. And these software solutions allow companies to manage converged appliances with compute and storage and networking included. So generally the the software pieces have those pieces in place: hypervisor, storage and network. In some cases, we see HCI software perhaps may not have a networking piece in place because those components are already covered or it may not be as relevant to the use case. But generally speaking, HCI software can be deployed on commodity hardware or it's available to be deployed on a select list of OEM server vendors. But the main point with HCI software, it's it's decoupled from a specific vendor appliance. It's not limited to a single vendor, and customers have some choice over deploying their HCI software. Dave Littman: Okay. Sounds like there's some flexibility there. Go ahead, Bruce. Bruce Kornfeld: Yeah, if I can jump in here, I would say another thought process would be, um, back in the early days of HCI, appliances were needed, probably because it wasn't so easy for an IT team to build it themselves. It had to be a closed environment. It had to be okay, these specific servers, this software, this version of the hypervisor, right. So it had to be a bundled, tested solution that they knew they can just plug in and work. Well, if I'm if I'm allowed to give a little bit of a StorMagic plug here, I think I am, which which is that, you know, we're kind of unique in the industry is that we don't require well, A) we don't require an appliance. That's why we're in this report as HCI software, obviously. But our software is designed to be super flexible so that our customers can use any server they want, as long as it's an x86 variant, any server they want. They can mix and match between any vendor, any model, any disk drive configuration, any memory. Um, so it just adds the ultra flexibility for our customers. The real world use case for this is there is a big movement in the industry. There are a lot of enterprises out there, organizations that have single server deployments at their edge sites because they just couldn't afford HA, high availability. Now what they can do is, they can procure a second server that doesn't have to be identical. They can load a hypervisor of their choice and StorMagic SvSAN and we don't care, as long as the two servers can run the same version of the hypervisor. That's our lowest common denominator. We'll do all the HCI storage, virtualization and high availability so that that's the way our software works. We are, you know, like I said, we work on any server. Our strongest partnership is with HPE. We have a global OEM agreement with them and they make it even easier for customers. So now any channel partner of HPE's around the world sells a complete solution. It's not an appliance per se, but the channel partner, integrator or HPE, take two HPE servers, our software, any hypervisor, and away they go. They have a bundled HCI solution that they can deliver to their end user customers.

In this clip, Todd Dorsey of DCIG explains that "hyperconverged infrastructure (HCI)" was created to address the complexities of managing compute, storage, and networking individually in data centers. Over time, HCI transitioned from appliance-based to software-centric solutions. This software can often be deployed on various hardware, offering clients flexibility away from vendor-locked appliances. Bruce Kornfeld, CMO of StorMagic, emphasizes the evolution from closed, bundled solutions to more flexible ones, highlighting StorMagic's unique position. Their software allows mixing servers and configurations, focusing on flexibility and high availability. Their collaboration with HPE furthers the reach of their HCI solutions, ensuring a streamlined experience for clients.

Categories:
  • » Cybersecurity Webinars » Backup & Recovery
  • » Cybersecurity Webinars
  • » Cloud Webinars
  • » Data Management » Networking
  • » Webinar Library » StorMagic
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • edge
  • stormagic
  • dcig
  • security
  • storage
  • cloud
  • hci
  • backup
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: What is HCI Software?

              Upcoming Webinar Calendar

              • 01/27/2026
                01:00 PM
                01/27/2026
                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era
                https://www.truthinit.com/index.php/channel/1759/ai-quantum-attacks-exposed-your-survival-guide-for-the-next-gen-threat-era/
              • 01/27/2026
                01:00 PM
                01/27/2026
                Mastering AD CS Protection for Enhanced Threat Prevention Strategies 8.0
                https://www.truthinit.com/index.php/channel/1775/mastering-ad-cs-protection-for-enhanced-threat-prevention-strategies-8-0/
              • 01/28/2026
                10:00 AM
                01/28/2026
                Strategies for Protecting Data in the AI Era with DSPM
                https://www.truthinit.com/index.php/channel/1797/strategies-for-protecting-data-in-the-ai-era-with-dspm/
              • 01/28/2026
                10:55 AM
                01/28/2026
                Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization
                https://www.truthinit.com/index.php/channel/1769/transforming-insights-into-action-a-comprehensive-security-strategy-for-scalable-data-democratization/
              • 01/29/2026
                10:00 AM
                01/29/2026
                Is Your Cybersecurity Strategy Prepared for 2026 After 2025's Test?
                https://www.truthinit.com/index.php/channel/1705/is-your-cybersecurity-strategy-prepared-for-2026-after-2025s-test/
              • 01/29/2026
                12:00 PM
                01/29/2026
                Transforming Secure Access through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1772/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/03/2026
                04:00 AM
                02/03/2026
                De la visibilidad a la protección: estrategias para asegurar datos sensibles
                https://www.truthinit.com/index.php/channel/1792/de-la-visibilidad-a-la-protección-estrategias-para-asegurar-datos-sensibles/
              • 02/03/2026
                01:00 PM
                02/03/2026
                Evolution of Cloud Adaptability and AI Performance
                https://www.truthinit.com/index.php/channel/1760/evolution-of-cloud-adaptability-and-ai-performance/
              • 02/10/2026
                12:00 AM
                02/10/2026
                Transforming Secure Access Through Netskope One Private Access Solutions
                https://www.truthinit.com/index.php/channel/1802/transforming-secure-access-through-netskope-one-private-access-solutions/
              • 02/19/2026
                03:00 AM
                02/19/2026
                DACH Partner Insights - Breakfast Webinar on Keepit Solutions
                https://www.truthinit.com/index.php/channel/1786/dach-partner-insights-breakfast-webinar-on-keepit-solutions/
              • 02/19/2026
                01:00 PM
                02/19/2026
                The CISO Dilemma: Fostering Innovation & Security in the Age of AI
                https://www.truthinit.com/index.php/channel/1809/the-ciso-dilemma-fostering-innovation-security-in-the-age-of-ai/
              • 03/03/2026
                01:00 PM
                03/03/2026
                Energize Your Connections with Netskope and Presidio Solutions
                https://www.truthinit.com/index.php/channel/1803/energize-your-connections-with-netskope-and-presidio-solutions/

              Upcoming Spotlight Events

              • Jan
                27

                AI & Quantum Attacks Exposed: Your Survival Guide for the Next-Gen Threat Era

                01/27/202601:00 PM ET
                • Feb
                  03

                  Evolution of Cloud Adaptability and AI Performance

                  02/03/202601:00 PM ET
                  More events

                  Upcoming Industry Events

                  • Jan
                    27

                    Mastering AD CS Protection for Enhanced Threat Prevention Strategies 8.0

                    01/27/202601:00 PM ET
                    • Jan
                      28

                      Strategies for Protecting Data in the AI Era with DSPM

                      01/28/202610:00 AM ET
                      • Jan
                        28

                        Transforming Insights into Action: A Comprehensive Security Strategy for Scalable Data Democratization

                        01/28/202610:55 AM ET
                        More events

                        Recent Spotlight Events

                        • Jan
                          22

                          Netskope: Securing Access: Go Beyond VPN and NAC to Universal ZTNA

                          01/22/202601:00 PM ET
                          • Jan
                            20

                            Beyond The Basics: IT Service Delivery Workflows That Close the Efficiency Gap

                            01/20/202601:00 PM ET
                            • Dec
                              10

                              The Next Generation of Managed Data Security Services

                              12/10/202501:00 PM ET
                              More events

                              Recent Industry Events

                              • Dec
                                18

                                Insight into IconAds, SlopAds, and AI Threats on the 2026 Horizon

                                12/18/202501:00 PM ET
                                • Dec
                                  16

                                  HUMAN Dialogue: Discover the True Insights Behind Page-Level Performance Intelligence

                                  12/16/202501:00 PM ET
                                  • Dec
                                    11

                                    Partner Tech Insights: Bridge Gaps and Enhance Revenue with Druva’s Microsoft Expansion.

                                    12/11/202501:00 PM ET
                                    More events
                                    Truth in IT
                                    • Sponsor
                                    • About Us
                                    • Terms of Service
                                    • Privacy Policy
                                    • Contact Us
                                    • Preference Management
                                    Desktop version
                                    Standard version