Feeds

Intel set to join AMD-backed Green Grid

Once there's something to join

High performance access to file storage

Come early next year, Intel will end its holdout and join the Green Grid consortium backed by rival AMD.

As it stands, the Green Grid isn't a consortium, group or any type of proper entity. The member companies behind the project - including AMD, Sun Microsystems, HP, IBM and Rackable Systems - have been working to finalize contracts that would in fact establish the Green Grid group as a legal organization. With any luck, the contracts will be polished off over the next couple of months at which time Intel's membership in the group, which focuses on energy-friendly data centers, will also be announced.

How do we know this?

Well, we've interpreted the semantic and gesture dance of Intel and AMD representatives as best as possible.

When asked yesterday what was keeping Intel from joining the Green Grid project, Intel VP Will "Smooth As" Swope replied, "We are not part of the Green Grid."

Swope happened to be at AMD's Sunnyvale headquarters for part of a data center energy consortium being held in concert with the Department of Energy. And, after downing our question with that odd declaration, Swope gave a wink and a nod to AMD's marketing manager Larry Vertal.

In an interview, Vertal then declined to comment on whether or not Intel was joining the Green Grid - a sure sign that it is - and declined to comment on whether or not Intel would be one of the founding 11 board members of the group - a sure sign that it will be.

"There will be some public announcements in the next couple of months," he said.

The DOE officials seemed intrigued about the Green Grid project, which is a vendor-led consortium to improve the energy consumption traits of data centers. The vendors hope to turn the organization into more of a customer-led group once it gets going.

Over 100 companies covering all aspects of the data center have expressed interest in joining the Green Grid, Vertal said.

The group marks one of the few bodies that has all of the major server vendors and chip makers talking together. Whether or not anything comes of the goodwill remains to be seen.

In the meantime, the vendors will continue to try and make the most of energy cost concerns by insisting that they have the lowest power hardware. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.