Cray Inc., progeny of the storied Cray Research, recently released its XT5 family of Linux-based supercomputers. Cray says the XT5's massively parallel processor (MPP) system includes a new eight-socket compute blade that quadruples local memory capacity, doubles processor density and improves energy efficiency. Other features include single-fan vertical cooling, compute blades designed for optimal airflow and CPU configurations up to 192 processor sockets or 768 CPU cores. To improve scalability, the Cray XT5 family also includes the industry's first integrated hybrid supercomputer, the Cray XT5h system. The XT5h integrates multiple processor architectures—including vector processors, GPUs, accelerators and FPGAs—with a complete software development environment into a single system supporting diverse work flows.
At Supercomputing 2007, Appro unveiled its forthcoming Xtreme-X Supercomputer Series, a product line based on scalable clusters that provide cost-effectiveness, energy efficiency and scalability. The series is designed to scale out data centers for medium- to large-scale enterprises and HPC deployments. The first model in the series, the Appro Xtreme-X1, will ship in the first half of 2008 and is based on dual-socket, Quad-Core Intel Xeon processors. Besides its 128 nodes/512 processors and 6TF of computing power in a single 42U equipment rack, the product has Appro's new Directed Airflow cooling configuration, which the company says will reduce data-center floor space by 30% while maximizing power and cooling efficiency. In addition, the Xtreme-X1 features redundant (Dual Rail) InfiniBand connections with low-latency Mellanox ConnectX host channel adapters and Ethernet management fabric and network switches, with all critical components being easily accessible, hot-swappable and redundant.
No Starch Press continues its tradition of naughty geek entertainment with the 2nd edition of Hacking: The Art of Exploitation by Jon Erickson. Although other books in this genre show not only how to run other people's exploits but also how to perform and write them on your own, Erickson uses examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Some examples include stack-based overflows, heap-based overflows, string exploits, return-into-libc, shellcode and cryptographic attacks on 802.11x. A live Linux CD also is included.
Please send information about releases of Linux-related products to James Gray at firstname.lastname@example.org or New Products c/o Linux Journal, 1752 NW Market Street, #200, Seattle, WA 98107. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal
Win an iPhone 6
Enter to Win
|Geek Hide-away in Guatemala - Stay for Free!||Nov 26, 2015|
|Microsoft and Linux: True Romance or Toxic Love?||Nov 25, 2015|
|Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That.||Nov 24, 2015|
|Cipher Security: How to harden TLS and SSH||Nov 23, 2015|
|Web Stores Held Hostage||Nov 19, 2015|
|diff -u: What's New in Kernel Development||Nov 17, 2015|
- Cipher Security: How to harden TLS and SSH
- Microsoft and Linux: True Romance or Toxic Love?
- Non-Linux FOSS: Install Windows? Yeah, Open Source Can Do That.
- Geek Hide-away in Guatemala - Stay for Free!
- Web Stores Held Hostage
- Firefox's New Feature for Tighter Security
- It's a Bird. It's Another Bird!
- PuppetLabs Introduces Application Orchestration
- diff -u: What's New in Kernel Development
- IBM LinuxONE Provides New Options for Linux Deployment