Feeds

Fujitsu pulls out switch blade for IBM, Dell and HP

All together now

Securing Web Applications Made Simple and Scalable

Fujitsu has kicked off a major effort to see its 10Gbps networking gear make its way into blade servers from the likes of HP, IBM, Dell and Sun Microsystems. More broadly, Fujitsu expects increased standardization in the blade market in the near future.

Photo of Keith Horn

In August, Fujitsu Microelectronics America (FMA) rolled out a 20-port 10Gbps Ethernet switch IC dubbed the MB8AA3020. The product is aimed at ATCA and micro TCA blade servers. Fujitsu hopes the major server vendors will adopt the product at a quick clip, as they embrace 10Gbps gear.

"We will work with partners to sell this product as part of a total solution for companies such as Dell, HP and IBM," said Keith Horn (pictured), FMA's COO, during a meeting this week in Santa Clara. "If you're an IBM or an HP, you don't want to do this in house."

So far, blade server vendors have rejected most of the nudges toward standardization. Each vendor - be it Sun, IBM, HP or even an Egenera - has come up with its own chassis, processor and networking options. IBM has been the lone major vendor to make any real call for blade standards, but it wants everyone to build around its BladeCenter line – not the most attractive proposition for rivals.

Horn expects the blade server market to start converging and hopes to work with a variety of partners to craft a common switch blade that will be broadly adopted.

"There is certainly more of a drive underway toward standardization," he said.

Away from the switching action, FMA announced this week that it's now accepting ASIC designs for customers hoping to tap its 65-nanometer CMOS manufacturing process. Parent Fujitsu has a new $1bn fab coming online in April of 2007 to produce 90nm and 65nm integrated circuits with 300mm wafers. ®

The Essential Guide to IT Transformation

More from The Register

next story
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.