Feeds

Superstar multi-core start-up MIA

Have you seen PeakStream?

HP ProLiant Gen8: Integrated lifecycle automation

Server, software and chip darling PeakStream appears to have entered the start-up protection program.

Shot of milk carton with PeakStream logo

PeakStream, where are you?

PeakStream's web site and telephone numbers have turned dysfunctional. Sources tell The Register that's because the software start-up has been acquired. But which vendor would buy PeakStream and then be too ashamed to admit it?

PeakStream - like rival RapidMind - makes software that helps developers craft code for multi-core processors. The PeakStream tools turn single-threaded applications into multi-threaded software that can run well across things such as GPGPUs (general purpose GPUs) and even plain, old multicore chips from the likes of Intel and AMD. In short, the PeakStream tools let single threaded developers live in a multi-core world with relative ease.

PeakStream has enjoyed financial support from all the right venture capitalists - Sequoia and Kleiner Perkins Caufield and Byers (KPCB) included. Our sources, however, indicate that the start-up has spent the last couple of months asking suitors to bring it in-house.

Likely purchasers would include Sun Microsystems, Intel, Nvidia, AMD, IBM, HP, Microsoft, Red Hat, Cray and the list goes on.

So far, we've ruled out all of the above except IBM, Red Hat and HP.

PeakStream officials have yet to return our calls seeking comment.

Have you seen this start-up? ®

Eight steps to building an HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.