Feeds

IBM and Dell lick their lips as Microsoft and Google buy billions in gear

The death of the white box makers

Internet Security Threat Report 2014

Radio Reg Voracious buyers such as Yahoo!, Microsoft and Amazon represent a niche in the server market - a very lucrative niche. So, we've seen companies such as IBM and Dell come out recently with gear aimed right at the service provider set.

Episode 17 of Semi-Coherent Computing takes a look at the "white box killer" hardware available with Chris Hipp and Dan Olds joining yours truly for an action-packed discussion.

The show starts off by probing IBM's new iDataPlex unit and then moves to Dell's custom Cloud program. We also explore Microsoft's decision to go hog wild with data centers in shipping containers.

Overall, these service provider-friendly systems build on a lot of the high performance computing work done over the years at labs and big businesses. So, once again, we're seeing HPC goodness makes its way downstream.

Dan is so enamored with this the trend that he's planning to set up a data center van, which will let him go from customer site to customer site for on location analysis. "All I need from you, Mr. Customer, is an outlet, a hose and perhaps a storm drain," he said.

The show wraps up with a chat about Citrix's struggles to pull meaningful revenue away from VMware. We wonder if Microsoft will have any more luck once it gets its act together.

In addition, we take a brief look at quantum computing start-up D-Wave, which hopes to hit 512 qubits by the end of this year.

Anyway, on to the show.

Semi-Coherent Computing - Episode 17

Open source types can get Ogged and Vorbed here, those plagued by low-bandwidth can catch a smaller, crappier quality show here or a monster-sized show here.

You can also grab the show off iTunes here or subscribe to the show via this feed.

As always, let me know if there's anything you'd like to see covered in future shows or any special guests you would like to have on the program.

Thanks for your ears. ®

Beginner's guide to SSL certificates

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.