Feeds

Compaq unable to deck Alpha platform

The idea's a bad joke for a multitude of reasons

  • alert
  • submit to reddit

High performance access to file storage

Information from the Gartner Group seen by The Register has suggested that companies investing in the Alpha platform running on Windows NT are betting on a "high risk" strategy over the 36 months. That is because Compaq could deck the Alpha platform, according to current thinking at Gartner. If Gartner's predicitions are true, that will cause dismay at Microsoft, which is pinning its hopes on the Alpha 64 architecture, while uncertain of the future of the Merced platform. Digital/Unix, soon to be renamed, only represents a "moderate risk" over the same period. The uncertainty appears to be due to the Thoughts of Compaq Chairman Eckhard Pfeiffer, thinks the market research company. Last week, we reported that by the end of this year, high end Alpha machines will cost around the same price as current, high end processors from Intel to be released February end. The market research company appears to think that Pfeiffer is mulling over how long his company can keep the Alpha platform alive. But other considerations which could dash these predictions include the Federal Trade Commission (FTC), which has placed the Alpha architecture firmly under its wing. We are given to understand by sources close to the FTC that Intel cannot be allowed to have a monopoly on high end processors, now, or in the future. Towards the end of this year, The Register understands that high speeds in the Alpha roadmap will mean a switch to a slot strategy. Compaq, with Alpha, has a number of partners in this strategy as reported here and elsewhere. Seems like the Sundance strategy still has something of a life... ® Related Stories FTC issues handcuffing order Compaq-Digital workstation market to retain stability Compaq merges workstations with Alpha on top Pfeiffer positions Alpha against Merced Samsung sets up Alpha S&M arm Grove squeezed between Pfeiffer and Gerstner For Sundance, search the old site For more detailed coverage of Compaq-DEC, see Shannon knows Compaq

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.