Feeds

Sun puts co-founder back to work

Outbound Joy passes inbound Bechtolsheim

  • alert
  • submit to reddit

High performance access to file storage

Sun Microsystems acquired one of its co-founders in a deal structured around a ham sandwich.

Andy Bechtolsheim - employee #1 and the man who hired Scott McNealy - and his start-up Kealia will now become part of Sun, the companies announced Tuesday. Scott McNealy said the idea for an acquisition came up during a recent lunch with Bechtolsheim and other co-founders Bill Joy and Vinod Khosla. Financial terms, other than the sandwich, were not released.

A giddy McNealy introduced Bechtolsheim during a Sun conference here.

Kealia has been working on Opteron server designs, primarily thin 1U and 2U systems. The idea is to use the Kealia kit to quickly build out Sun's fledgling Opteron server line. Sun's first ever Opteron box - the dual-processor V20z - was unveiled today. Sun plans to release Opteron workstations, a 4 processor box and larger SMP systems over time.

Bechtolsheim's hiring conjured up an uncomfortable nostalgia among Sun employees. During a cocktail hour with Sun folk, we were told that e-mail servers all around the Sun nation would be humming once news of the stealth deal hit.

One Sun staffer was also heard to remark that Bechtolsheim would "actually do some work, unlike that Joy guy." It is believed that Joy was asked to do an Opteron server design, only the "Edison of the Internet" presented a diagram of two strangely insectoid turtles copulating, surrounded by masses of grey goo. This left the Sun boardroom stunned and confused, but confirmed Joy's genius.

Out-of-control nanomatter was not, we understand, considered a design constraint by Bechtolsheim's team.

Aside from the acquisition news, Sun also kicked off a new promotion for its Opteron kit.

Sun launched an installment plan pricing model for the V20z in which developers can pay $1,499 a year for three years and receive the server and Sun's entire developer and enterprise software stacks.

"The beauty is . . . you pay less cash than you would for the software alone, and you get the hardware at no extra charge," McNealy said. "Let's see Microsoft do that . . . or let's see Dell do that."

Sun also cut the price of its N1 product line in half from $2,000 to $1,000 for an average-sized customer. ®

Related Stories

Bill Joy leaves Sun
Bill Joy's greatest gift to man - the vi editor
Bill Joy spurned job at 'out of control' Google

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.