Skip to main content

Lithium-metal battery could boost gadget power

Non-IBM Power8 servers to appear early next year

Servers and components are under development as part of third-party licensing deals

 The first third-party servers licensed to use IBM's Power architecture will be on the market early next year.
IBM last year started licensing the architecture so other companies could build Power servers, chips and components. The first third-party Power servers will be for cloud and high-end applications, said Ken King, general manager, OpenPower alliances at IBM's Systems and Technology Group.
Ultimately, low-end servers could use Power chips, but that's for server makers to decide, King said. Derivative Power8 chips being designed outside IBM could be used in third-party servers, King said.
IBM's Power hardware has been used in the Linux-based Watson supercomputer, which beat humans in the TV quiz show "Jeopardy." But IBM's Power server shipments have declined in recent years as buyers move to commodity hardware running on x86 chips. IBM agreed to sell its x86 server business to Lenovo for $2.3 billion and is now focusing exclusively on the Power architecture. Ultimately, low-end servers could use Power chips, but that's for server makers to decide, King said. Derivative Power8 chips being designed outside IBM could be used in third-party servers, King said. However, a timeline for third-party Power8 chips hitting the market has not been confirmed, IBM said.
The non-IBM Power servers will compete with IBM's high-end System Z and customized PureSystem offerings. But King didn't seem concerned about that, saying the reason for licensing Power to other vendors is so that the architecture will proliferate in more servers.
"It's about making Power more relevant in the marketplace," King said.
Mainframes and IBM's Power are fading away, so the company had to start licensing the chip architecture, said Nathan Brookwood, principal analyst at Insight 64.
"More important for the company is to get Power out into the larger IT industry, [to] show that its got a place outside its homegrown systems," Brookwood said.
IBM last year formed the OpenPower Alliance to cooperate with other companies on hardware and software development for the Power architecture. OpenPower members include Google and Tyan, which have already shown developer boards based on the Power8 architecture. Other notable members include Samsung and Micron, which are developing memory, and Nvidia, which is developing graphics chips.
IBM recognized Power's struggles and made a smart move by opening it up to other companies, said Charles King, principal analyst at Pund-IT.
IBM may lose Power server shipments to competition, but there could be revenue from licensing, services and system deployments. Power could find some acceptance in high-performance and cloud computing. Pund-IT's King said.
"One thing Power is effective at as compared to x86 is the ability to support a larger number of virtual machines in a concurrent system. Power CPUs support classic reliability, availability and serviceability features that IBM servers are well known for," King said

Comments

Popular posts from this blog

Information Security Interview Questions & Answers

The number of Information Security related jobs are growing extensively…. There is a huge requirement for skilled InfoSec professionals across the globe.. the jobs positions are available for freshers, experienced guys and top management (typically CISO .HCL,BPLetc)… This post is my attempt to collect typical InfoSec interview question and answers to help those looking out opportunities in this field… I’ll keep on updating the questions regularly.. You can also share/contribute any questions you might have faced during your InfoSec interviews…. Category I: General Security Concepts / Network Security / OS Security 1) Is there any difference between Information Security and IT Security? If yes, please explain the difference. Ans- Yes. Information Security and IT Security are both different terms often used interchangeably. IT Security focuses on purely technical controls (like implementing antivirus, firewall, hardening systems etc) while Information Security is more wider ter...

8 pair usage for data in Cat 6 Wire in Networking

Today I Post the Cat6 wire pair use in Networking ,we all know 8 pair in cat 6 and but no idea how any pair use in Networking .only 4 pair Use in networking , Like this Photo, If 4 pair not work in cat6 wire we use another 4 Pair same wire Save time and Money 

MCSE INTERVIEW QUESTIONS AND ANSWER

MCSE INTERVIEW QUESTIONS AND ANSWER ,VERY USEFULL OUR NEXT JOB INTERVIEW MCSE Questions and Answers: :  1 :: What is the use of IGMP protocol?  Internet Group Management Protocol: - It allows internet hosts to participate in multicasting. The IGMP messages are used to learn which hosts is part of which multicast groups. The mechanism also allow a host to inform its local router, that it wants to receive messages.  2 :: What are Ping and Tracert?  Ping and tracert are the commands used to send information to some remote computers to receive some information. Information is sent and received by packets. Ping I particularly used to check if the system is in network or not. It also gives packet lost information. In windows ping command is written as ping ip_address Tracert is called as trace route. It is used to track or trace the path the packet takes from the computer where the command is given until the destination. In windows ping command is written as trac...