Feeds

HP trades in Transmeta chips for Athlons in PC blades

Dial-A-Quote dials in

HP ProLiant Gen8: Integrated lifecycle automation

HP has done the inevitable and replaced the Transmeta processors that once powered its blade PC products with low-power Athlon chips from AMD.

The new line of bc1500 blade PCs are HP's latest attempt to reformat the desktop PC market. The systems with Transmeta-based chips seemed to have done as well as most Transmeta-based products - fair to bad. Going with the Athlon 64 chips should at least let HP claim it's making more of a mainstream play with these anything-but-mainstream systems.

You all know the blade PC and thin client pitch. Companies save on administration costs and reduce headaches by moving PC functions into the server room. With blade PCs, each user get his own server or shares the server with just a few people. The users still have a monitor, keyboard and mouse on their desk but no wheezing, heater underneath it. With thin clients, more users typically share a more powerful server.

Much to Microsoft and Intel's delight, the blade PC/thin client idea never really seems to catch on. Users like their desktops, and the whirr makes them feel comfortable. It also provides customers with a physical object to abuse when things go wrong.

Still, HP, IBM, Sun Microsystems, Lenovo, Wyse, ClearCube and others remain determined to sell these newfangled systems.

Who do you turn to when you need a quotation to promote something like a blade PC? You guessed it. Dial-A-Quote.

"With Consolidated Client Infrastructure (CCI), businesses are able to better secure, protect and manage their PCs, putting them one step ahead of common IT challenges," said Rob Enderle, principal analyst at The Enderle Group. "With CCI, HP has the broadest desktop portfolio of any vendor, with all platforms operating under a consistent set of management and security tools. This breadth showcases that HP is targeting their innovation efforts at improving those things most important to business customers."

And you can trust Rob because as his online resume shows, he's worked with HP. But that's neither here nor there.

The blade PC/thin client pitch really does make sense, which is one of the more frustrating aspects of the technology. To make your blood boil have a look at HP's gear here. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.