Skip to main content

Top 5 Supercomputers Of The World (CTNews)


Supercomputers of today are the retrogressive image of the one’s in 1960s i.e. a gigantic machine racking up an entire room with a huge screen and hundreds of wires and buttons.

Sure, modern computers look like a stack of books in a library, but the computing prowess of these babies is outrageous. The processing power of the latest Supercomputers is calculated in Petaflops ( ability to do one quadrillion floating point operations per second).

Let’s begin the top 5 list of Supercomputers of this generation.



5. Mira (USA)

Mira is IBM’s self-built Supercomputer that has the peak performance of 8.6 petaflops. At Argonne National Laboratory, US, it uses IBM’s BlueGene/Q platform with 786,000 core processors.


4. K Computer ( Japan)

At 10.5 petaflops, Fujitsu’s K computer is located at Japan’s RIKEN Advanced Institute for Computational Science. With 705,000 SPARC64 VIIIfx octo-core processors, K computer performs scientific operations including global disaster prevention, meteorology and medical research.


3. Sequoia (USA)

Another IBM machine Sequoia also runs on BlueGene/Q design with 1.6 million 16- core processors. It has a performing speed of 17.2 petaflops.


2. Titan (USA)

A major upgrade to another Supercomputer Jaguar,  Titan performs at a blazing speed of 17.6 petaflops. It uses a total of 561,000 Opteron 6274 16-core 2.2GHz processors along with NVIDIA GPUs.


1. Tianhe-2 (China)

Literally meaning Milky Way-2, the king of supercomputers processes at a staggering speed of 33.9 petaflops. It was developed by China’s National University of Defense Technology. This peerless Supercomputer runs on a whopping 3,120,000 cores, comprising of a mix of Intel Xeon E5 processors, custom processors and Intel Xeon Phi coprocessors.
With these super fast machines on board, scientists have managed to expand their boundaries and work the ultra complex quantum mechanical calculations. Also, these supercomputers are utilized in climate research, simulation of early moments of Universe, Nuclear fusion, and Cryptanalysis.
 

Comments

Popular posts from this blog

Kali Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A   -> apropos : Search Help manual pages (man -k)  -> apt-get : Search for and install software packages (Debian/Ubuntu)  -> aptitude : Search for and install software packages (Debian/Ubuntu)  -> aspell : Spell Checker  -> awk : Find and Replace text, database sort/validate/index B  -> basename : Strip directory and suffix from filenames  -> bash : GNU Bourne-Again SHell  -> bc : Arbitrary precision calculator language  -> bg : Send to background  -> break : Exit from a loop  -> builtin : Run a shell builtin  -> bzip2 : Compress or decompress named file(s) C   -> cal : Display a calendar  -> case : Conditionally perform a command  -> cat : Concatenate and print (display) the content of files  -> cd : Change Directory ...

Top 10 WiFi Hacking Tools Used by Hackers

Many people come in search of us for WiFi hacking tools . This post is especially for those who is in need of WiFi hacking tools. Note: We are not responsible for any damage that cause you. Make sure you use these tools for experiment purposes only in controlled environment. 1.Aircrack Aircrack-ng is the next generation of Aircrack with lots of new features and  mainly used by hackers to hack WiFi connections. Aircrack-ng is an 802.11 WPA-PSK and WEP  keys cracking program that can recover keys. Aircrack-ng cracks WEP keys using the FMS attack, PTW attack, and dictionary attacks, and WPA using dictionary attacks. 2.AirSnort AirSnort supports both Windows and Linux operating system  but there is no longer updates for this tool. It is popular tool for decrypting WEP encryption on a Wi-Fi 802.11b network. This tool might be outdated, but still you can download it free on sourceforge. 3.Kismet Kismet another great software used as...

The Top Ten Hacker Tools of 2015 (CTNews)

Cyber Hacking (“Cyber Security” formally) there are millions of tools which are available on the Internet either as Freewares or as Sharewares. If you are security researcher, pentester or a system admin, you need to have this on your PCs/laptops to find the vulnerabilities and plug them.  Concise Courses conducted an online poll to determine top ten hacking tools out of some of the famous ones. Here is the list which came out the winner on the poll. 1. Nmap:  Network Mapper Abbreviated as nmap is a versatile tool for Network Security, plus it is free and open source.It  is largely used by network administrators for network discovery and security auditing. System admins use nmap for network inventory, determining open ports, managing service upgrade schedules, and monitoring host(A term used for “a computer on a network”) or service uptime. The tool uses raw IP packets in many creative ways to determine what hosts are available on the network...