Cray Inc., progeny of the storied Cray Research, recently released its XT5 family of Linux-based supercomputers. Cray says the XT5's massively parallel processor (MPP) system includes a new eight-socket compute blade that quadruples local memory capacity, doubles processor density and improves energy efficiency. Other features include single-fan vertical cooling, compute blades designed for optimal airflow and CPU configurations up to 192 processor sockets or 768 CPU cores. To improve scalability, the Cray XT5 family also includes the industry's first integrated hybrid supercomputer, the Cray XT5h system. The XT5h integrates multiple processor architectures—including vector processors, GPUs, accelerators and FPGAs—with a complete software development environment into a single system supporting diverse work flows.
At Supercomputing 2007, Appro unveiled its forthcoming Xtreme-X Supercomputer Series, a product line based on scalable clusters that provide cost-effectiveness, energy efficiency and scalability. The series is designed to scale out data centers for medium- to large-scale enterprises and HPC deployments. The first model in the series, the Appro Xtreme-X1, will ship in the first half of 2008 and is based on dual-socket, Quad-Core Intel Xeon processors. Besides its 128 nodes/512 processors and 6TF of computing power in a single 42U equipment rack, the product has Appro's new Directed Airflow cooling configuration, which the company says will reduce data-center floor space by 30% while maximizing power and cooling efficiency. In addition, the Xtreme-X1 features redundant (Dual Rail) InfiniBand connections with low-latency Mellanox ConnectX host channel adapters and Ethernet management fabric and network switches, with all critical components being easily accessible, hot-swappable and redundant.
No Starch Press continues its tradition of naughty geek entertainment with the 2nd edition of Hacking: The Art of Exploitation by Jon Erickson. Although other books in this genre show not only how to run other people's exploits but also how to perform and write them on your own, Erickson uses examples to illustrate the most common computer security issues in three related fields: programming, networking and cryptography. Some examples include stack-based overflows, heap-based overflows, string exploits, return-into-libc, shellcode and cryptographic attacks on 802.11x. A live Linux CD also is included.
Please send information about releases of Linux-related products to James Gray at email@example.com or New Products c/o Linux Journal, 1752 NW Market Street, #200, Seattle, WA 98107. Submissions are edited for length and content.
James Gray is Products Editor for Linux Journal
Getting Started with DevOps - Including New Data on IT Performance from Puppet Labs 2015 State of DevOps Report
August 27, 2015
12:00 PM CDT
DevOps represents a profound change from the way most IT departments have traditionally worked: from siloed teams and high-anxiety releases to everyone collaborating on uneventful and more frequent releases of higher-quality code. It doesn't matter how large or small an organization is, or even whether it's historically slow moving or risk averse — there are ways to adopt DevOps sanely, and get measurable results in just weeks.
Free to Linux Journal readers.Register Now!
|Secure Server Deployments in Hostile Territory, Part II||Jul 29, 2015|
|Hacking a Safe with Bash||Jul 28, 2015|
|KDE Reveals Plasma Mobile||Jul 28, 2015|
|Huge Package Overhaul for Debian and Ubuntu||Jul 23, 2015|
|diff -u: What's New in Kernel Development||Jul 22, 2015|
|Shashlik - a Tasty New Android Simulator||Jul 21, 2015|
- Hacking a Safe with Bash
- Secure Server Deployments in Hostile Territory, Part II
- Huge Package Overhaul for Debian and Ubuntu
- The Controversy Behind Canonical's Intellectual Property Policy
- KDE Reveals Plasma Mobile
- Shashlik - a Tasty New Android Simulator
- Home Automation with Raspberry Pi
- Embed Linux in Monitoring and Control Systems
- diff -u: What's New in Kernel Development
- General Relativity in Python