Feeds

Steve Jobs poaches IBM chip and blade geek

Big Blue phones lawyers

High performance access to file storage

Mark Papermaster, one of the top Power chip gurus at IBM and its current vice president in charge of its blade server development unit, wants to take a job at Apple as a technology adviser to Steve Jobs, the company's chief executive officer.

After 26 years at Big Blue, you can probably imagine that a change would feel good. However, IBM is trying to enforce a non-compete to keep Papermaster from taking the gig, and this week filed a lawsuit in its home court to enforce the non-compete.

The lawsuit, which was filed on October 22 in the United States District Court for the Southern District of New York, alleges that as one of the key 300 executives on IBM"s "elite Integration & Values Team" and as a key designer of Power processors and blade servers, Papermaster is "privy to a whole host of trade secrets and confidences" that IBM uses to design products.

While non-compete agreements are tough to enforce, IBM's lawyer, Evan Chesler of New York's Cravath, Swaine, and Moore, is no slouch. This is the lawyer that talked the U.S. government into dropping IBM's antitrust consent decree restrictions - and IBM does have home field advantage in the court.

IBM did not want to talk about the case. "Mr. Papermaster's employment by Apple is a violation of his agreement with IBM against working for a competitor should he leave IBM," explained Fred McNeese, director of IBM corporate media relations in an email. "We will vigorously pursue this case in court." McNeese also said he did not have a copy of the brief, which I find hard to believe. But this is the Fortune 500, right?

According to the complaint by IBM, Papermaster's non-compete agreement (which is part of his employment contract at Big Blue) does not allow him to work for competitors for a year and also has geographic restrictions that do not allow him to work in physical places where he had job responsibilities within a year. The non-compete also requires he not solicit other IBMers to move to a company for two years. The complaint says Papermaster resigned on October 21 and said his job at Apple would begin in November.

The complaint is not terribly specific about what job Papermaster is taking at Apple, but IBM's lawyers claim that in the wake of Apple's acquisition of clone Power chip maker PA Semi earlier this year and now Papermaster's appointment, Apple and IBM will be competitors in the server space. IBM's complaint goes so far to assert that "Apple intends to expand its presence in the server business" based on these actions.

History has suggested otherwise, and Apple has, in fact, resisted any temptation to take its Xserve business seriously and push into the SMB space with more powerful Power or Xeon servers - despite the imploring of Apple customers and enthusiasts.

Apple, of course, switched from PowerPC to Intel Core and Xeon processors for its desktops, laptops, and servers in 2005. While IBM's Power processors are great for midrange and high-end servers, they are too hot and too expensive for use in Apple's relatively low end iron. And the PowerPC family of chips made by IBM and Motorola and used in Apple gear since the early 1990s were not keeping pace with what Intel was doing with Core and Xeon chips in terms of price and performance. Hence Apple's move.

It is hard to argue that Apple needs the Power chip expertise that Papermaster has. PA Semi was founded more than four years ago by Dan Dobberpuhl, the lead chip designer on Digital Equipment's Alpha line of RISC processors and the StrongARM line of embedded processors, and Jim Keller, an Alpha chip designer who was the co-designer of the original Opteron chip at Advanced Micro Devices.

PA Semi had also hired Pete Bannon, an Alpha EV5 and EV7 chip designer that went over to Intel to work for a while on the impending "Tukwila" four-core Itaniums before coming aboard PA Semi. Keller left just before the samples came out almost two years ago, and Apple has not said which of the remaining PA Semi tech people are still around. But by creating a Power clone called PWRficient (which started sampling in February 2007), the company Apple acquired in April of this year had plenty of Power, x64, Itanium, and Alpha smarts.

No comment from Apple on all of this. Naturally. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.