Feeds

IBM intros Gallatin servers

Claim 20% performance boost

  • alert
  • submit to reddit

Choosing a cloud hosting partner with confidence

IBM today revamped its line of Intel servers with four and eight-way eServer systems based on "second generation" 2.0GHz Intel Xeon MP, or Gallatin, processors.

The company said the servers offer customers "more bang for their bucks" - delivering up to 20 percent more performance, at the same price as the models they replace.

The servers, which support both Linux and Microsoft Windows, include new models of the four-way IBM eServer xSeries 255 rack and tower system; fresh four-way models of the x360 rack-dense server; and four and eight-way models of the x440 eServer.

On the two-tier SAP Standard Application Sales and Distribution (SD) Benchmark, an eight-way x440 server (with 2.0GHz Xeon MP processors) achieved 690 SAP SD benchmark users with 1.95 seconds average dialog response time - 15 per cent more than an eight-way Sun Fire V880's (600 SD users) and 80 per cent better a HP ProLiant DL 760 server (382 SD users) recorded in similar tests. There's more information on SAP benchmarks here.

IBM said the introduction of these servers will help further increase sales of its Intel processor-based servers. IBM eServer xSeries revenue grew 15 percent between Q3 2002 and Q3 2001.

Since the eServer x440 was introduced earlier this year, IBM has shipped "thousands" of eight-way systems based on the Intel Xeon processor MP while Dell and HP have shipped none, it says. IBM boasts that its rivals are not expected to have eight-way machines based on the second-generation Xeon MP until next year. HP should be announcing a Gallatin-based machine today, according to Extremetech.

Worldwide availability is planned for November 15 for the new four- and eight-processor x440 models; November 18 for the new x255 models; and December 3 for the new x360 models.

Intel is to release more details of three new Xeon MPs chips this week. Extremetech has been granted an early briefing. Tune in for details of cache sizes etc. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.