Language Selection

English French German Italian Portuguese Spanish

Unfazed, IBM pumps Power chip program

Filed under
Hardware

On Wednesday, IBM announced that 11 new members have joined a consortium of Power processor users. It also released specifications and software to make it easier to build computers using the forthcoming Power-based Cell processor that IBM, Toshiba and Sony developed. In addition, Big Blue has new customers in medical imaging and in defence, said Nigel Beck, chairman of the Power.org consortium.

And on a new section of its Web site, IBM makes the case that most growth in the processor market is taking place with servers, game consoles and mobile devices--markets where Power is used -- not personal computers. IBM disclosed the site in a filing with the Securities and Exchange Commission on Wednesday.

Apple has been one of the highest-profile customers for Power processors, buying PowerPC chips from IBM and Motorola spin-off Freescale Semiconductor since 1994. That changed on Monday when Apple announced its 2006 shift to Intel processors, chips it disparaged for years.

But IBM, far from being daunted, instead set the stage for a showdown with Intel by declaring just how ambitious its Power plans are: "IBM's strategy is to spread its open chip technology and establish Power Architecture as the dominant industry standard," Big Blue said on its Web site.

On the one side, Apple's departure tarnishes the image of the group and its related "Power Everywhere" marketing campaign, said Illuminata analyst Gordon Haff. "This certainly takes some of the sheen off of it," he said.

On the other, for burnishing the Power image, the arrival of Cell should offset the departure of Apple. "We believe opening hardware and software specs for Cell will likely expand interest in Power.org," Pund-IT analyst Charles King said in a report.

Though Apple's move won't hurt IBM's Power processor manufacturing business much, there are direct effects elsewhere in its business. The company is trying to make Linux useful on its PowerPC- and Power5-based servers, but Apple's move left in the lurch two allies in that effort. Terra Soft Solutions and the Fedora PowerPC project both use Macs in their efforts to develop Linux for Power-based computers.

Terra Soft, which sells Yellow Dog Linux and Macs with the operating system already installed, said it has options to survive Apple's switch to Intel processors. In a statement, CEO Kai Staats said the company doesn't plan to switch its product line to Intel chips but that it still plans to sell its Y-HPC version of Linux for high-performance computing clusters, which can be used on systems such as IBM's JS20 blade servers. And, Staats added, "Things are already in motion to enable a world of greater Power Architecture diversity."

Colin Charles, a lead programmer for the effort to bring the Fedora version of Linux to PowerPC chips, pledged future support for the project.

"I'm not going to back off the project, even if it means that its real use will only last another two more years, and after that, it'll just be for big iron IBM (computers)," Charles said. "IBM hardware will always still exist, though consumer Apple stuff is going away in about two years, sadly -- I think it's a big mistake."

IBM's response is to fight back with numbers, calling out In-Stat statistics forecasting that the game console market will grow from 3.5 million units this year to 33.5 million in 2008.

Two nongaming customers are using Cell, Beck said, though he wouldn't name them. One is involved in medical imaging, and the other is tapping the chip for military use in image recognition and targeting, he said.

Eleven new organisations joined the 16 existing members of the Power.org consortium.

Full Story.

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS