Broadberry Intel Modular Server review
Broadberry offers SMBs an affordable blade server with some unusual storage features and a sharp focus on virtualisation. In this exclusive review, Dave Mitchell takes a closer look at Intel’s Modular Server and tests its VM live migration feature.
The belief that blade servers are only for enterprises was shattered when HP, and more recently Fujitsu, launched scaled-down versions of their high-end systems aimed firmly at SMBs. We've already had exclusive access to the HP BladeSystem c3000 and the Fujitsu Primergy BX400 S1, and in this exclusive review, we take a closer look at Intel's very own Modular Server.
Supplied by Broadberry Data Systems, the Intel Modular Server is designed for SMBs looking to consolidate their IT services onto a single platform. It's designed to beat the blade competition on value and this latest version supports Intel's integrated virtualisation features.
Intel's Modular Server is designed for SMBs looking to consolidate their IT services onto a single platform.Size-wise, the Modular Server matches the HP and Fujitsu models with its 6U chassis. Server blade support is more limited though, since while it has room for up to six compute blade modules, Intel only offers one model.
The modules use Intel's custom MFS5520VIR motherboard, which supports two Xeon 5500 or 5600 processors and up to 192GB of memory. Both the Fujitsu BX400 and HP c3000 have eight half-width slots and provide a wider range of server blade options.
When it comes to storage, the two fixed bays at the front of the Modular Server each support three LFF drives or seven SFF drives. This is where Intel differs radically from the competition, as neither the BX400 nor c3000 have any integral storage support, and so the server blades must carry their own or slots must be dedicated to storage blades.
All drive bays in the Modular Server are linked to the chassis midplane and routed to a storage controller blade at the rear. This allows an internal SAN to be set up where selected disks are placed in storage pools that can then be used create virtual drives, each with their own RAID array.
In This Article
Application security fallacies and realities
Web application attacks are the most common vulnerability, so what is the truth about application security?Download now
Your first step researching Managed File Transfer
Advice and expertise on researching the right MFT solution for your businessDownload now
The KPIs you should be measuring
How MSPs can measure performance and evaluate their relationships with clientsDownload now
Life in the digital workspace
A guide to technology and the changing concept of workspaceDownload now