Feeds

IBM's cloud computer drifts over Georgia and Ohio

Future of admin sanity at stake

Intelligent flash storage arrays

According to BusinessWeek's public relations department, IBM and Google have already won the virtualized cloud computing war, discovered a cure for HIV and brought about world peace. Curious then that IBM continues to invest in both virtualization and cloud computing.

During "a ribbon-cutting ceremony in Atlanta today," IBM revealed plans to work with the Georgia Institute of Technology and the Ohio State University around two of computing's most-hyped areas. The research partners will work over virtualization and cloud computing technology until the concepts bend to their collective wills. With any luck, server administrators will one day end up with gear that's easier to use and that chews through less power as a result of the research.

Lest you think IBM is engaged in hype fluffery, the company said that its arrangement will produce an actual thing - the Critical Enterprise Cloud Computing Services (CECCS) facility. Both universities will be able to tap into the facility, sharing their expertise, research and computing power.

It's a rare occasion when a vendor will face up to the task of defining something as vague as cloud computing, but IBM has accepted the challenge and then some.

We're told,

Virtualized data centers give organizations the ability to do more with fewer resources by optimizing the use of software, computing hardware and storage, and network infrastructure by sharing not only across departments but also across different physical locations. Cloud computing allows corporate data centers to operate more like the Internet by enabling computing across a distributed, globally accessible fabric of resources, rather than simply depending upon local machines or remote server farms.

Both definitions seem fair enough. Congratulations go out to IBM's public relations word smiths.

IBM has been kind enough to bless both schools with its BladeCenter HS21 servers, DS3400 storage systems, networking gear and Tivoli and WebSphere software.

"For future virtualized and service-oriented systems within a cloud environment, we contend that without the coordinated use of hardware, operating systems, middleware and applications, it will simply not be possible to meet the demands of tomorrow's critical applications and systems that support them," said Georgia Tech's Karsten Schwan. "The CECCS facility will be a test-bed for modern management tools, such as those provided by IBM Tivoli, and a visible artifact for interactions with industry technology users and developers in these regions and around the world."

Nice Tivoli plug, obedient research partner. ®

Intelligent flash storage arrays

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.