POWER3 microprocessor can perform up to two billion operations per second.
Published:
5 February 1999 y., Friday
Monday unveiled a more powerful supercomputer that is part of IBM_s plan to extend the use of what it calls "Deep Computing" by business users. The new supercomputer is an example of IBM_s effort to commercialize Deep Computing, which is the capacity to tie together unprecedented computer processing power and advanced software and algorithms to solve complex problems and derive meaning from vast mountains of data. "The Internet revolution is creating unprecedented quantities of data. The SP excels at helping people turn that data into valuable information," said R. Adkins, general manager, RS/6000. IBM_s next-generation RS/6000 SP supercomputer system contains the POWER3 microprocessor, the direct successor to the POWER2 Super Chip inside "Deep Blue," known for its chess victory over world chess champion G. Kasparov in 1997. IBM said the POWER3 microprocessor can perform up to two billion operations per second and is more than twice as powerful as IBM_s preceding RS/6000 machine. The POWER3 chip is aimed at applications such as computer analysis and simulation programs used by aerospace, automobile and drug manufacturers, the company said. The SP is a scalable system made up of building blocks called nodes, which can function alone or work with hundreds of other nodes. The system allows researchers to throw massive amounts of data-processing capacity at single tasks, or divide the processing power to handle a range of less intensive work.
Šaltinis:
IBM Corp.
Copying, publishing, announcing any information from the News.lt portal without written permission of News.lt editorial office is prohibited.
The most popular articles
Software company announced new structure_ of it_s business.
more »
Moto 360, Motorola's upcoming entry into the smartwatch industry, is rumored to be preparing for a July release.
more »
Unisys Corporation has announced Choreographer, a cloud management platform designed to direct and optimise key IT services and processes. Choreographer automates the lifecycle management of data centre and public infrastructure resources to help more efficiently deploy applications in both private and public cloud environments.
more »
This February 24-27, the world’s largest mobile technology exhibition “Mobile World Congress 2014” shall take place in Barcelona.
more »
Unisys Corporation reported a third-quarter 2013 net loss of $11.6 million, or a loss of 26 cents per diluted share, which included $22.6 million of pension expense. In the third quarter of 2012, the company reported a net loss of $12.4 million, or a loss of 28 cents per diluted share, which included $28.9 million of pension expense and $23.1 million of debt reduction charges.
more »
Akamai Technologies, Inc. (NASDAQ: AKAM), the leading provider of cloud services for delivering, optimizing and securing online content and business applications, today announced plans for future integration of Akamai Unified Performance technology into the Cisco® ISR-AX series of routers.
more »
Microsoft is to allow independent games developers to self-publish on its Xbox One games console. "Indies" will be able to create their own games, publish to the Xbox when they like, and set their own pricing, the computer giant has confirmed.
more »
Nokia has unveiled the Lumia 625, the largest Lumia Windows Phone yet, with a 4.7-inch screen and 4G.
more »
Unisys Corporation (NYSE: UIS) announced the availability of its Unisys Stealth Solution for Amazon Web Services (AWS) designed to enhance security for clients moving data into the cloud.
more »
The Open IPTV Forum (OIPF) has published a profile of HTML5, CSS, DOM3 and other related web technologies aimed at connected TV services and devices that implement a browser-based application environment.
more »
According to new research conducted by Unisys Corporation (NYSE: UIS), a majority of Americans are concerned about data breaches involving large organizations, but are evenly mixed on whether legislation should require private businesses to share cyber attack information with the government.
more »