Skip to main content

Top 5 Supercomputers Of The World (CTNews)


Supercomputers of today are the retrogressive image of the one’s in 1960s i.e. a gigantic machine racking up an entire room with a huge screen and hundreds of wires and buttons.

Sure, modern computers look like a stack of books in a library, but the computing prowess of these babies is outrageous. The processing power of the latest Supercomputers is calculated in Petaflops ( ability to do one quadrillion floating point operations per second).

Let’s begin the top 5 list of Supercomputers of this generation.



5. Mira (USA)

Mira is IBM’s self-built Supercomputer that has the peak performance of 8.6 petaflops. At Argonne National Laboratory, US, it uses IBM’s BlueGene/Q platform with 786,000 core processors.


4. K Computer ( Japan)

At 10.5 petaflops, Fujitsu’s K computer is located at Japan’s RIKEN Advanced Institute for Computational Science. With 705,000 SPARC64 VIIIfx octo-core processors, K computer performs scientific operations including global disaster prevention, meteorology and medical research.


3. Sequoia (USA)

Another IBM machine Sequoia also runs on BlueGene/Q design with 1.6 million 16- core processors. It has a performing speed of 17.2 petaflops.


2. Titan (USA)

A major upgrade to another Supercomputer Jaguar,  Titan performs at a blazing speed of 17.6 petaflops. It uses a total of 561,000 Opteron 6274 16-core 2.2GHz processors along with NVIDIA GPUs.


1. Tianhe-2 (China)

Literally meaning Milky Way-2, the king of supercomputers processes at a staggering speed of 33.9 petaflops. It was developed by China’s National University of Defense Technology. This peerless Supercomputer runs on a whopping 3,120,000 cores, comprising of a mix of Intel Xeon E5 processors, custom processors and Intel Xeon Phi coprocessors.
With these super fast machines on board, scientists have managed to expand their boundaries and work the ultra complex quantum mechanical calculations. Also, these supercomputers are utilized in climate research, simulation of early moments of Universe, Nuclear fusion, and Cryptanalysis.
 

Comments

Popular posts from this blog

Kali Linux Commands Cheat Sheet

Kali Linux commands cheat sheet. All basic commands from A to Z in Kali Linux has been listed below. A   -> apropos : Search Help manual pages (man -k)  -> apt-get : Search for and install software packages (Debian/Ubuntu)  -> aptitude : Search for and install software packages (Debian/Ubuntu)  -> aspell : Spell Checker  -> awk : Find and Replace text, database sort/validate/index B  -> basename : Strip directory and suffix from filenames  -> bash : GNU Bourne-Again SHell  -> bc : Arbitrary precision calculator language  -> bg : Send to background  -> break : Exit from a loop  -> builtin : Run a shell builtin  -> bzip2 : Compress or decompress named file(s) C   -> cal : Display a calendar  -> case : Conditionally perform a command  -> cat : Concatenate and print (display) the content of files  -> cd : Change Directory  -> cfdisk : Partition table manipulator for Linux  -> chgrp : Change group owne

How to Install and run Kali Linux on any Android Smartphone

Tutorial for installing and running Kali Linux on Android smartphones and tablets Kali Linux is one the best love operating system of white hat hackers, security researchers and pentesters. It offers advanced penetration testing tool and its ease of use means that it should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. Now a days more and more apps are available on Android operating system for smartphones and tablets so it becomes worthwhile to have Kali Linux on your smartphone as well. Kali Linux on Android smartphones and tablets allows researchers and pentesters to perform ” security checks” on things like cracking wep Wi-Fi passwords, finding vulnerabilities/bugs or cracking security on websites.  This opens the door to doing this from a mobile device such as a phone or a tablet. You can also install Kali Linux Distribution

The History of Apple mac OS Malware (CTNews)

Mac Malware : A Brief history of malware for Apple’s Mac OS from 2004 to present Mac users are pretty sure Apple’s integrated systems will never encounter any malware, how true is that? Lets check a brief history of Mac malware. Microsoft Windows users were the ones who were mostly affected with the computer malware, trojans, viruses. Just a few decades back, Mac users, on the contrary, would always feel proud to be using the right equipment because they believed Apple’s integrated systems would never encounter any malware. However, security researchers would tell us a different story.  Few decades back, Microsoft Window’s larger user base made it easy for hackers to target the user of this OS. However, now Apple’s market and in turn Mac users are also growing and at the same time Mac-oriented malware too is gaining popularity. This article is a recap of Apple’s complicated history with malware. 2004: Renepo: A shell script worm : This was designed specific