Feeds

Intel announces globo-dominance 'Cloud 2015' plan

$50bn of CIOs, major vendors already signed up

Internet Security Threat Report 2014

Any silicon you like - long as it's Intel

Intel says it will have no control over the Alliance, but it has been formally made "technical advisor" - indicating that it might get privileged access at the very least.

Vendors are also encouraged to work directly with Intel via its related "Cloudbuilders" programme, which already has such major players as HP, IBM, Microsoft, Canonical, Red Hat, EMC and Parallels signed up.

"If you're asking as a CIO, what can I do right now about moving forward," said Davis, "Cloudbuilders is supposed to be the answer". He insisted that kit developed early under this programme before the Alliance could hammer out any standards (or even "implementations") could still be replaced with the next-gen kit easily and simply down the road. The benefits of "federated" 2015 cloud are, apparently, already on offer.

"You can deploy the cloud today with no lock-in risk," he stated.

Talking to the Reg after the briefing, Davis admitted that a description of the Cloudbuilders scheme as "any silicon you like as long as it's Intel" was fair, but insisted that the chip colossus "does not have a unique advantage" in its position as sole advisor to the Alliance. Asked why there had been no attempt to include other chip makers such as AMD, ARM etc he told the Reg:

"Forcing the process to be less efficient by having more names involved would defeat the process."

All in all, it would seems that the new cloudy future from Intel and its allied customers and vendors could go any one of three ways.

It might, as Davis says, permit massive market expansion in which everyone gets rich as a booming IT sector hooks up billions more people to the worldwide net ever more efficiently and capably, with increased efficiency outweighed by expansion leading to climbing sales for Intel.

It might alternatively develop into a ruthless mechanism whereby Intel further consolidates its dominant market position, holding every part of the IT industry in an iron grip all the way from the fab to the end user and squeezing everyone else involved to the benefit of its own bottom line.

Or, of course, it may all fall on its arse and ultimately mean nothing. We'll just have to wait and see. ®

Intelligent flash storage arrays

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
You think the CLOUD's insecure? It's BETTER than UK.GOV's DATA CENTRES
We don't even know where some of them ARE – Maude
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.