Feeds

Superstar multi-core start-up MIA

Have you seen PeakStream?

Next gen security for virtualised datacentres

Server, software and chip darling PeakStream appears to have entered the start-up protection program.

Shot of milk carton with PeakStream logo

PeakStream, where are you?

PeakStream's web site and telephone numbers have turned dysfunctional. Sources tell The Register that's because the software start-up has been acquired. But which vendor would buy PeakStream and then be too ashamed to admit it?

PeakStream - like rival RapidMind - makes software that helps developers craft code for multi-core processors. The PeakStream tools turn single-threaded applications into multi-threaded software that can run well across things such as GPGPUs (general purpose GPUs) and even plain, old multicore chips from the likes of Intel and AMD. In short, the PeakStream tools let single threaded developers live in a multi-core world with relative ease.

PeakStream has enjoyed financial support from all the right venture capitalists - Sequoia and Kleiner Perkins Caufield and Byers (KPCB) included. Our sources, however, indicate that the start-up has spent the last couple of months asking suitors to bring it in-house.

Likely purchasers would include Sun Microsystems, Intel, Nvidia, AMD, IBM, HP, Microsoft, Red Hat, Cray and the list goes on.

So far, we've ruled out all of the above except IBM, Red Hat and HP.

PeakStream officials have yet to return our calls seeking comment.

Have you seen this start-up? ®

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.