Skip to main content
  1. Blog
  2. Article

Victor Tuson Palau
on 21 August 2012

ARM Server Explained


You have probably started to notice a continuous buzz around ARM Servers for the last few months:

  • Calxeda (an System on  a Chip maker) presented their solution at UDS-Q.
  • HP announced their moonshot program, which Canonical is playing a key role in
  • Dell also unveiled their ARM Server strategy
  • and the list goes on ..

But, do you know what it is all about? why are all these top companies interested on putting phone technology into servers? Will it work? Trying to answer these questions and more, I created an on-line presentation around ARM Servers for your viewing pleasure:

The presentation is done using Prezi.  Prezi is a new way to generate more dynamic presentations. I will give you a few tips:

  • When viewing a Prezi, make sure you click on the “Full Screen” for maximum effect (under More..)
  • You can also click on auto-run if you would like the animation to happen on its own
  • You can also use the right and left arrows to move around the animation at your leisure
  • If you want to zoom into something, just double click on it!

Enjoy! direct url:  http://prezi.com/_zwqpnowk8cv/arm-server/

Related posts


Massimiliano Gori
31 March 2026

How to manage Ubuntu fleets using on-premises Active Directory and ADSys

Cloud and server Article

The “hybrid fleet” is today’s reality: organizations diversify operating systems while Microsoft Active Directory (AD) remains the dominant identity “source of truth.” IT administrators must ensure Linux machines, like Ubuntu desktops and servers, behave as first-class citizens in this environment. Efficient Linux management demands unifi ...


David Beamonte
30 March 2026

Simplify bare metal operations for sovereign clouds

MAAS Article

The way enterprises are thinking about their infrastructure has changed.  Digital sovereignty of all kinds – data sovereignty, operational sovereignty, and software sovereignty – have begun to dominate the infrastructure discussion. Today, these abstract terms have become practical concerns for platform teams. Changing regulations, geopol ...


Massimiliano Gori
30 March 2026

How to Harden Ubuntu SSH: From static keys to cloud identity

Cloud and server Article

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, ...