Cray Inc., progeny of the storied Cray Research, recently released its XT5 family of Linux-based supercomputers. Cray says the XT5's massively parallel processor (MPP) system includes a new eight-socket compute blade that quadruples local memory capacity, doubles processor density and improves energy efficiency. Other features include single-fan vertical cooling, compute blades designed for optimal airflow and CPU configurations up to 192 processor sockets or 768 CPU cores. To improve scalability, the Cray XT5 family also includes the industry's first integrated hybrid supercomputer, the Cray XT5h system. The XT5h integrates multiple processor architectures—including vector processors, GPUs, accelerators and FPGAs—with a complete software development environment into a single system supporting diverse work flows.
At Supercomputing 2007, Appro unveiled its forthcoming Xtreme-X Supercomputer Series, a product line based on scalable clusters that provide cost-effectiveness, energy efficiency and scalability. The series is designed to scale out data centers for medium- to large-scale enterprises and HPC deployments. The first model in the series, the Appro Xtreme-X1, will ship in the first half of 2008 and is based on dual-socket, Quad-Core Intel Xeon processors. Besides its 128 nodes/512 processors and 6TF of computing power in a single 42U equipment rack, the product has Appro's new Directed Airflow cooling configuration, which the company says will reduce data-center floor space by 30% while maximizing power and cooling efficiency. In addition, the Xtreme-X1 features redundant (Dual Rail) InfiniBand connections with low-latency Mellanox ConnectX host channel adapters and Ethernet management fabric and network switches, with all critical components being easily accessible, hot-swappable and redundant.
No Starch Press continues its tradition of naughty geek entertainment with the 2nd edition of Hacking: The Art of Exploitation by Jon Erickson. Although other books in this genre show not only how to run other people's exploits but also how to perform and write them on your own, Erickson uses examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Some examples include stack-based overflows, heap-based overflows, string exploits, return-into-libc, shellcode and cryptographic attacks on 802.11x. A live Linux CD also is included.
Please send information about releases of Linux-related products to James Gray at firstname.lastname@example.org or New Products c/o Linux Journal, 1752 NW Market Street, #200, Seattle, WA 98107. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal
- Readers' Choice Awards 2013
- IBM Will Minimize Impact of Future Disasters
- December 2013 Issue of Linux Journal: Readers' Choice
- Sublime Text: One Editor to Rule Them All?
- Mars Needs Women
- RSS Feeds
- Raspberry Pi: the Perfect Home Server
- Tech Tip: Really Simple HTTP Server with Python
- Linux Systems Administrator
- Senior Perl Developer
- Mixtapes Community
36 min 35 sec ago
- KDE is one true DE
1 hour 10 min ago
- Command Line Shells (Bash, Zsh, etc.) are 2nd place
1 hour 39 min ago
3 hours 34 min ago
- yes it's Jupiter Broadcasting
4 hours 53 min ago
- nice to see PClinuxOS finally
7 hours 27 min ago
- Personally, I am no longer a
8 hours 24 min ago
- It's Jupiter
22 hours 48 min ago
- GIMP is certainly a graphic
23 hours 50 min ago
- Thanks For Your Sharing
1 day 4 hours ago