Feeds

HP leads pack with Istanbul iron

Double dense Nehalems too

High performance access to file storage

Server maker Hewlett-Packard advanced to the pole position in the x64 server race this morning as it launched a slew of new iron, some using Advanced Micro Devices' new six-core "Istanbul" Opterons 2400 and 8400 series processors announced yesterday and others rounding out the new ProLiant and BladeSystem machines that came out concurrent with the four-core "Nehalem EP" Xeon processors at the end of March.

In March, HP rolled out 11 new ProLiant Generation 6 servers sporting the Nehalem EPs, and today, the company is putting another three Nehalem boxes into the field as well as seven machines that support the Istanbuls.

Rather than just plunk the Istanbuls into the existing ProLiant G5 servers, whose chipsets do support the processors, HP has taken the technologies it rolled into the two-socket Nehalem EP machines in the G6 series and created a whole new Opteron lineup. These G6 technologies include dynamic power capping and other ThermalLogic tech that was once only in its BladeSystem blade servers.

Lots of systems sensors to measure performance, heat, and power consumption of server components; high efficiency and common power supplies; 6 GB/sec SAS disk controllers; and the new ProLiant Onboard Administrator, which is the merging of the Integrated Lights Out (iLO) service processor inside blade chassis and rack and tower servers and the Web console that used to be only on blades.

But don't get the wrong idea. The new Opteron-based servers will technically support both quad-core "Shanghai" Opterons, which had their prices cut dramatically on May 25 ahead of the Istanbul launch, as well as the Istanbul chips. And HP will continue to sell ProLiant G5 machines configured with Shanghai processors if that is what customers want.

AMD wants the Opteron processor to span a large range of performance and price points and move across two-socket, four-socket, and larger servers as it tries to take on Intel. With its Nehalem EP processors restricted to uniprocessor and two-socket boxes, AMD will probably have a significant advantage on four-socket and eight-socket servers. Intel's "Dunnington" Xeon 7400s have the advantage beyond this, with a few vendors - IBM, NEC, and Unisys being the key ones - building Xeon boxes that span up to 16 sockets.

High performance access to file storage

Next page: Lineup lowdown

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
USA opposes 'Schengen cloud' Eurocentric routing plan
All routes should transit America, apparently
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.