Feeds

Intel plays Switzerland in the cloud wars

Who will bear the ARM 'standard'?

Beginner's guide to SSL certificates

On the other ARM

The next generation of client devices seem to have a hankering for power-sipping ARM processors, and there is no reason in the world why the next generation of server platforms can't be based on multicore ARM chips coming from a true set of standards adopted by ARM licensees and software partners like Microsoft with Windows and a whole bunch of Linux vendors eager to chase a new market. Intel's dominance on the desktop lead to its dominance in the data center, after all. Seems like a trick that can be repeated. And it will be if there is to be any justice in the world and progress in server design,

If Intel wants to rally people behind a standard, it is to get them lined up against the ARM threat and to get into the loop to know what some of the biggest IT shops in the world - those 70 original members comprise $50bn in annual IT expenses, which is about 4 per cent of total IT spending globally, and it won't be long before it is hundreds of billions of dollars in collective spending and therefore influence - are thinking about clouds.

I think it would be a wonderful thing if the IT shops of the world got together and made IT vendors actually create standards. We never got a Unix standard, but we did get two different warring factions who at least knocked some commonality into the Unix stacks. The reason the open systems revolution took off in the late 1980s was because companies were sick to death of proprietary mainframes and minicomputers. And the joke is that the remaining proprietary minis (from IBM and Hewlett-Packard) and IBM mainframes have for the past decade supported enough of the POSIX and SPEC 1170 standards that you could, in fact, brand their proprietary operating systems as a variant of Unix with a bit more bit twiddling here and there.

Unix won the standards war, in the long run, but the market shifted to Windows, which has become a volume-based standard like x64 processors. Those who want portability today code in Java, PHP, and a bunch of other runtimes and programming languages, and those who don't care run .NET. About half the market cared about portability (if you look at server spending by operating system) in the 1990s, and about half still care today (if you add Linux and Unix together).

Nothing has changed, and the battle for openness continues. It is just happening in other parts of the stack and now out there on the cloud layer.

Whenever vendors talk about standards and proclaim they want to alleviate vendor lock-in, you have to be suspicious. Either they are stupid, they think you are stupid, or they are liars. Maybe they are two of those, and perhaps all three in very rare cases. (Believe me, some vendors believe their own lies.) Red Hat, for instance, is promoting its Delta Cloud standards not just because it is a good guy wearing a white – er, red – hat in the IT market, but because if there are open standards then it will be easier for companies to move from VMware's pricey virtualization and cloud management products to Red Hat's cheaper ones.

Always look for the control points when trying to figure out a competitive landscape. When IT vendors in the systems racket (they weren't even called servers back then) had their own chips and operating systems - and usually multiple operating systems on the same platform - something like a Unix standard could at least be proposed because the lock-in was deeper down in the stack, at the instruction level inside the chip and in the legacy applications. Under those conditions, you could get vendors to agree on a set of APIs to make applications more portable - and mainly because the software companies that drove your system sales were insisting on it and the IT shops that bought their code were as well.

But today, the lock-in when it comes to servers is embodied in all the stuff that wraps around the x64 platform – the form factor of the blade server, the preferred hypervisors and operating systems on the platform, and the system management tools that are tuned for the box. The lock-in is weaker, but this is precisely the kind of thing that server makers are not going to want to part with. It's all that they have left. Ditto for server hypervisor vendors, who are now behaving just like physical server makers from days gone by, with their incompatible management consoles, incompatible VM formats, and so on. They not only want lock in. Their business models depend on putting off standards as long as possible.

This, of course, puts them in direct contention with the ODCA. And perhaps with some of the most powerful CIOs in the world, who want exactly what Intel is billing as "Cloud Independence Day." These CIOs are lost in their server stacks and application silos and they cannot do their jobs of doing more IT for less money each year with calcified systems.

They want exactly what Skaugen said they want: federated private and public clouds that allow workloads to move seamlessly between the two, and they don't want to have to worry about security issues and vendor lock in. They most certainly want a lot more automation in their data centers, and they want their storage pools and data centers to manage themselves as conditions change, just like our bodies do to keep us alive. In fact, I would argue that the job of managing pools of virtual servers with myriad virtual machines and various policies governing energy consumption and utility pricing for infrastructure and someday software is so complex that is can only be automated for it to work properly.

That means fewer expenses for managing the infrastructure (sorry, system administrators, but you are fired again) while increasing flexibility. The other Intel idea of client-aware services being pumped out of clouds is interesting, too. Why not have the best rendering of an application, depending on your device and using back-end resources in the data center if you have a crap graphics card?

But wanting things to be standards doesn't make them standards. If the CIOs representing something more like half of the hardware and software spending get behind the ODCA effort, then it may actually get some teeth and be able to compel some standards for cloud interoperability like Intel is suggesting. And the only benefit Intel will get out of it will be the inside dope as things are being discussed by ODCA members. Every standard that is good for Intel will be just as good for Opteron, Sparc, Power, and even ARM. ®

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
Turnbull should spare us all airline-magazine-grade cloud hype
Box-hugger is not a dirty word, Minister. Box-huggers make the cloud WORK
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Do you spend ages wasting time because of a bulging rack?
No more cloud-latency tea breaks for you, users! Get a load of THIS
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.