Feeds

IBM and Intel open some blade server specs

Standards grab

  • alert
  • submit to reddit

Top 5 reasons to deploy VMware with Tegile

Hoping to create a level of standardization in the blade server market, IBM and Intel plan to announce tomorrow that they have opened some up the specifications for their shared blade designs.

IBM has posted information announcing the BladeCenter design platform specifications program. (IBM pulled this link shortly before our story posted, but this will do the trick.) These documents show that IBM and Intel are trying to attract switch, adapter card, chipset and other component makers by handing out the inner-workings of the BladeCenter product. In 2002, IBM and Intel announced their plans to codevelop blade servers.

IDG News Service was the first to report on the new spec program. IBM and Intel likely have other reporters trapped under NDAs until tomorrow.

The spec program is a bit underwhelming. IBM and Intel have long been looking for other server makers, namely HP and Dell, to pick up their designs. They hoped there would be some kind of standard blade design in the industry and that it would be theirs. Our reports from the field, however, suggest that HP's blade design has been more popular than IBM's. Our sources say that IBM has been forced to upgrade its power supply three times to deal with heat issues caused by BladeCenter, while HP's kit runs nice and cool. Dell has never been a major blade player and ships unimpressive gear. It's rumored to be working with Fujitsu on new designs.

IBM and Intel clearly hope the spec program will help remedy some of these standardization losses. If you get enough component makers delivering product for the BladeCenter first, it could put some pressure on HP.

The agreement presented on IBM's site opens up most of the component specs but keeps the chassis and management module secret. ®

Related stories

Orion delivers first 'personal cluster' workstation
HP boots ServerWorks with new Xeon kit
Egenera and its amazing technicolor IPO
HP gets vague about Opteron and Itanium blades

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.