Subject: Systems | June 3, 2013 - 06:27 PM | Tim Verry
Tagged: Xeon Phi, tianhe-2, supercomputer, Ivy Bridge, HPC, China
A powerful new supercomputer constructed by Chinese company Inspur is currently in testing at the National University of Defense Technology. Called the Tianhe-2, the new supercomputer has 16,000 compute nodes and approximately 54 Petaflops of peak theoretical compute performance.
Destined for the National Supercomputer Center in Guangzhou, China, the open HPC platform will be used for education and research projects. The Tianhe-2 is composed of 125 racks with 128 compute nodes in each rack.
The compute nodes are broken down into two types: CPM and APU modules. One of each node type makes up a single compute board. The CPM module hosts four Intel Ivy Bridge processors, 128GB system memory, and a single Intel Xeon Phi accelerator card with 8GB of its own memory. Each APU module adds five Xeon Phi cards to every compute board. The compute boards (a CPM module + a APU module) contain two NICs that connect the various compute boards with Inspur's custom THExpress2 high bandwidth interconnects. Finally, the Tianhe-2 supercomputer will have access to 12.4 Petabytes of storage that is shared across all of the compute boards.
In all, the Tianhe-2 is powered by 32,000 Intel Ivy Bridge processors, 1.024 Petabytes of system memory (not counting Phi dedicated memory--which would make the total 1.404 PB), and 48,000 Intel Xeon Phi MIC (Many Integrated Cores) cards. That is a total of 3,120,000 processor cores (though keep in mind that number is primarily made up of the relatively simple individual Phi cores as there are 57 cores to each Phi card).
Inspur claims up to 3.432 TFlops of peak compute performance per compute node (which, for simplicity they break down as one node is 2 Ivy Bridge chips, 64GB memory, and 3 Xeon Phi cards although the two compute modules that make up a node are not physically laid out that way) for a total theoretical potential compute power of 54,912 TFlops (or 54.912 Petaflops) across the entire supercomputer. In the latest Linpack benchmark run, researchers saw up to 63% efficiency in attaining peak performance -- 30.65 PFlops out of 49.19 PFlops peak/theoretical performance -- when only using 14,336 nodes with 50GB RAM each. Further testing and optimization should improve that number, and when all nodes are brought online the real world performance will naturally be higher than the current benchmarks. With that said, the Tianhe-2 is already besting Cray's TITAN, which is promising (though I hope Cray comes back next year and takes the crown again, heh).
In order to keep all of this hardware cool, Inspur is planning a custom liquid cooling system using chilled water. The Tianhe-2 will draw up to 17.6 MW of power under load. Once the liquid cooling system is implemented the supercomputer will draw 24MW while under load.
This is an impressive system, and an interesting take on a supercomputer architecture considering the rise in popularity of heterogeneous architectures that pair massive numbers of CPUs with graphics processing units (GPUs).
The Tianhe-2 supercomputer will be reconstructed at its permanent home at the National Supercomputer Center in Guangzhou, China once the testing phase is finished. It will be one of the top supercomputers in the world once it is fully online! HPC Wire has a nice article with slides an further details on the upcoming processing powerhouse that is worth a read if you are into this sort of HPC stuff.
Also read: Cray unveils the TITAN supercomputer.
Subject: Editorial, General Tech | April 5, 2012 - 01:14 AM | Scott Michaud
Tagged: China, hack, Anonymous
China has been the target of numerous successful hacking attempts by Anonymous over the last week. Many sites were defaced and in some cases data such as accounts and e-mail addresses were compromised.
Anonymous has ramped up their activism over the last six months beyond their usual DDOSing and intrusion of US government and corporate websites. Last autumn Anonymous threatened to expose members of Mexican drug cartels although that initiative faded away without too much controversy later in the year. This year they have instead assaulted the Chinese Government.
This could get just as messy as the drug cartels.
Much of the defacing attempts broadcast, in both English as well as Chinese, messages about the Chinese Government and their practices. One such message states:
Your Government controls the Internet in your country and strives to filter what it considers a threat for it. Be careful. Use VPN for your own security. Or Tor.
The attacks have been sustained for over a week at this point. 486 compromised sites have been listed on Pastebin as of March 30th. There does not appear to have been any public response from the Chinese Government at this point.
What sticks out to me the most is how widespread the attack on Chinese online infrastructure appears to have been despite China’s traditional focus towards cyber security. Regardless of who you are, or what you have previously been capable of, you need to take security seriously as true security is extremely difficult.
Subject: General Tech | April 15, 2011 - 08:56 AM | Jeremy Hellstrom
Tagged: Virus, Malware, China, Android
"Android handsets used in China accounted for 64.1% of global virus/malware attacks in the first quarter of 2011, according to China-based mobile security solutions provider NetQin Mobile.
There were 2.53 million Android handsets infected by viruses or malware around the world during the first quarter, and most were in China due to the popularity of white-box Android handsets in the country, NetQin indicated. US ranked second with 7.6%, followed by Russia with 6.1%, India with 3.4%, Indonesia with 3.2%, Hong Kong with 2.7% and UK with 2.1%. In the first quarter, there were 1,014 new malware items and 101 new viruses, NetQin said.
Of the infected Android handsets globally, 57% were through downloading applications from Android Market, followed by using unbranded handsets with 17%, downloading applications from WAP or www. websites with 14%, using Bluetooth with 7% and using memory cards with 3%, it said.
A breakdown of the attacks by Android version shows that 1.6 and previous versions accounted for 5%, 2.1 34%, 2.2 45% and 2.3 16%."
Here is some more Tech News from around the web:
- WebOS 3.0 Beta Leaked -- Looks Good, Interesting @ Linux.com
- Windows Home Server 2011 review @ The Inquirer
- Watch Windows 8's new Metro login while this creepy guy watches you @ Engadget
- Samsung SuperSpeed drives out next month @ The Register
- Hypertext Creator: Structure of the Web 'Completely Wrong' @ Slashdot
- High-Quality Open Source Body Tracking Sans Kinect @ Make:Blog
- Google squashes Chrome security bugs, updates Flash Player @ The Inquirer
- TRENDnet TV- IP612WN ProView Wireless N Pan/Tilt/Zoom Internet Camera Review @ Madshrimps
- Open-sourced blueprints for civilization @ Make:Blog
- Teaching an old PSU new tricks @ The Tech Report
- Hardware and Games at Gadget Show 2011 - XSR
- Antec KÜHLER H2O 920 Giveaway at Asetek.com/Twitter
- OC3D & Aria @ Gadget Show Live Part 2
Get notified when we go live!