Nutanix Complete Cluster Combines Server and Storage Infrastructure

Nutanix has released Nutanix Complete Cluster, a solution designed for virtualization that uses a distributed system software layer to combine servers and storage into a single tier and eliminates the need for network storage.

"In increasingly virtualized datacenters, we believe that storage will gradually cease to be implemented as we know it today and will itself also become completely virtualized, leveraging commodity hardware, being self-optimizing, and scaling-out to new levels," explains Mark Peters, senior analyst at Enterprise Strategy Group.

Nutanix Complete Cluster uses a building block approach designed to achieve scalability. Organizations can start with a single Nutanix Complete Block, which is a 2U unit that contains four x86 nodes, eight Intel Xeon Processors, 192 GB of RAM (upgradable to 768 GB), 1.28 TB of ioMemory, a 1.2 TB of SATA solid state drive, and 20 TB of SATA drives. Each node in the Nutanix Complete Block runs a VMware ESXi hypervisor. Organizations can expand their virtualization environment by adding more Nutanix Complete Blocks as needed.

Nutanix Complete Cluster supports virtualization capabilities such as VMware vMotion, High Availability (HA), Dynamic Resource Scheduling (DRS), as well as data management features such as fast VM cloning, capacity optimization, and converged backup.

Key features of Nutanix Complete Cluster include:

  • Out-of-the-box functionality;
  • A user interface that provides virtual machine visibility across server and storage resources;
  • Zero-overhead cloning and thin provisioning mode;
  • Instant backup and recovery of virtual machine data on the cluster;
  • Local solid-state drives with data-tiering to hard disks; and
  • Highly fault-tolerant architecture.

Nutanix Complete Cluster is available now through the company’s certified solution partners. Further information about Nutanix Complete Cluster can be found at the nutanix.com.

About the Author

Leila Meyer is a technology writer based in British Columbia. She can be reached at [email protected].

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.