Compaq Wildfire to debut February 2000

Platform will eventually scale to 512 CPUs

  • alert
  • submit to reddit

High performance access to file storage

Reliable sources close to Compaq's plans have said that the company's Wildfire clustering and server technology will be introduced in February of next year. The introduction of the system has been delayed for quite a while, but in recent weeks, Compaq has shown demonstrations of the high end platform both at the Telecoms show in Geneva and more recently at its US Decus event. The source, who declined to be identified by name, claimed that the benchmarks her company had compiled showed that the box offered a serious challenge to its competitors, including Sun Microsystems, in both price and performance. She added that there was no danger whatever of Compaq ceding victory to Intel, in the chip war, and pointed out that an agreement brokered by the Federal Trade Commission (FTC) ensured that Alpha processors would be made by the chip giant for 10 years. The source added that she was surprised Intel got so much publicity for its up-and-coming IA-64 (Merced-Itanic) platform, given that the first systems to be released, in June next year, would not offer anything like the performance of the Alpha processor and would not even be able to compete on price. Large corporations would buy Merced machines but only as an evaluation platform initially, she said. There would be no volume sales of Merced for most of next year. She said that most Compaq customers were now satisfied with the company's decision to drop support for Windows NT for the Alpha processor. While she agreed that in some respects it was a shame, it was likely that NT would take some time before it could scale to the 24-way, 48-way, 96-way and eventually 512-way CPU WildFire systems Compaq is developing. Sun, she claimed, was already very late with the development of its UltraSparc processor and we were unlikely to see new systems from the company until the end of next year. The source also suggested that cooperation between itself and AMD on Slot B technology was still on track, and that IBM would, indeed, fab Alphas using copper interconnect technology at some time in the future. ®

Top three mobile application threats

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story


SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.