Feeds

Gateway opts for MIPS-Linux for Web server offering

Old Wintel loyalist strikes deal with Cobalt Networks

  • alert
  • submit to reddit

High performance access to file storage

Long-standing (if often somewhat reluctant) Wintel loyalist Gateway has announced what appears to be a shock defection to Linux and MIPS. The company has signed an with Cobalt Networks whereby Cobalt will supply it with "server technologies" for a new range of Gateway server appliances. Cobalt produces a MIPS-based range of cheap server appliances that are used for small and medium businesses, and also for Internet and Web hosting purposes. They're quite popular with service providers as part of a managed server service, as they're cheap, compact and fairly easy to service, and although they haven't been adequate for heavy-duty Web hosting, Cobalt announced clustering support last month. The "server technologies" Cobalt will be supplying to Gateway seem to be rather more of a badging exercise than the expression would tend to imply. According to Gateway senior VP Van Andrews the aim is to combine "the strength of Cobalt's server appliance technology with Gateway's growing Internet services." So Gateway intends to take the Cobalt product line and push it as "simple, reliable and affordable computing solutions to our business, education and government customers." This of course is by no means the first time Gateway has attempted to break loose of the Wintel straightjacket - it just hasn't been very good at it so far. As Gateway evidence in the Microsoft antitrust action showed, the company at one point put Microsoft's nose out of joint by attempting to develop its own UI for Windows. Then of course it there was the purchase of Amiga, which showed both a wish to break free and an apparent inability to do so. And just last month Gateway capped its refusal to use Athlon by saying it would phase out use of AMS K6-2s and K6-IIIs. Chipzilla, which has its own server appliance roadmap, is unlikely to be chuffed by Gateway playing footsie with MIPS - so will it be different, this time around? ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.