Feeds

Microsoft slings sack of green at US universities

Goes into hyper-greenery overdrive

High performance access to file storage

Microsoft has handed over half a million dollars to four US universities doing research into green computing.

The software giant, which has recently been building power-chugging data centres across the globe to beef up its web-based onslaught, said yesterday that it hoped the research would help develop techniques to lower power consumption in software and hardware products.

The firm said it has given $500,000 to the Harvard University, Stanford University, the University of Oklahoma and the University of Tennessee.

That lucky bunch of academics will be encouraged to deploy “novel thinking” on ways to reduce power consumption and to make technology more environmentally friendly in the future, said Microsoft senior external research director Sailesh Chutani.

Topics to be tackled include virtualisation, power consumption analysis and low power microachitectures.

It’s a move that also represents Microsoft’s latest attempt to recast the multinational company as a friend of the environment. Microsoft boss Steve Ballmer was rolled out at CeBIT in March this year to punt Redmond’s newfound love for all things green-coloured.

At the event Big Steve claimed: "We are on a path to build some of the most power-efficient data centres in the world, 40 per cent more efficient than a few years ago, and we think our Hyper-V virtualisation technology could take data centre power consumption down by another five times."

However, Microsoft’s to-the-rescue energy-saving hypervisor, which will be built into Windows Server 2008, hasn’t landed yet. The firm missed its original release date by a significant margin, but that didn’t stop Microsoft giving party pooper Hyper-V an “official launch” at its Heroes Happen Here event earlier this year.

The company’s technical server and tools advisor Mark Gilbert told The Register yesterday that the team was “quite close to the guidance we’ve be giving on Hyper-V.” In other words, Microsoft reckons it remains pretty much on target with its chalked-in August release date.

He said that the firm has been grappling with a number of “challenges and bugs” with the technology, which will directly compete with market leader VMWare’s offering. “But we’re feeling quite good about it,” he added. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.