Feeds

IBM introduces Power3, promises gigachip by 2001

Spate of RS announcements to arrive Monday

  • alert
  • submit to reddit

High performance access to file storage

IBM will on Monday announce a spate of products based around its RS business unit including iteration three of its Power processor intended for serious number crunching. Future iterations of the Power 3 will use CMOS 7S copper interconnect technology, and silicon on insulator (SOI). A gigachip will arrive in 2001. The company said the Power 3 will be used in its 43P Model 260 graphical workstation, and has eight execution units fed by a 64Gbps memory subsystem. It will also use a method called hardware memory pre-fetch. Other products IBM will introduce include Intellistations workstation using the Pentium II 450 Xeon chips, IBM Workgroup Conferencing for AIX, the RS S70 advanced, and a fresh revision of AIX, version 4.3.2. Ian Roscoe, business manager of the RS/6000 unit at IBM Emea, said that his company was maintaining a dual strategy on workstations, with some working on Unix and some on NT. "There's a large number of customers in the Unix environment who look at getting high performance," he said. In addition to the RS 43P model 260, IBM will also introduce the 43P model 150. The Intellistations are the M Pro, aimed at 2D and 3D applications, and the high end Z Pro. Subsystems include a maximum capacity of 2Gb of 100MHz ECC memory and 82Gb storage capacity. The S70 Advanced uses the RS64-II PowerPC chips, but IBM said that it can now be attached to its RS/6000 "Stealth" SP as an external node. This forms part of IBM's plans to connect many of its boxes together -- next year, Big Blue will create a way of linking Intel NetFinity servers to SPs. Roscoe said that version 4.3.2 of AIX gave better workstation and graphics performance, scalability and interoperability. "We've created a level of stability for the OS from now until the end of 2000 by introducing dot revisions," he said. Part of the reason for that was because customers needed to be sure that different issues including Year 2000 compliance, and the introduction of the Euro, were secure, he said. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.