Feeds

Cell server maker promises pint-sized powerhouse

'Turismo' mightier than blades

Choosing a cloud hosting partner with confidence

SC05 Mercury Computer Systems – the leading Cell-based server maker – has started showing off a new "Turismo" design that promises to pack an incredible amount of compute power in a small space.

Mercury had pictures of the Turismo system on display this week at the Supercomputing event here in Seattle. The rectangular box can supply up to 800 GigaFLOPS of horsepower in a 600 cubic-inch system. Four of the boxes can be combined to create a 5U system that cranks out 3.2 TeraFLOPs. A six-foot rack of the boxes would produce 25 TeraFLOPs.

Mercury's CTO Craig Lund was happy to pat the company on the back for this achievement.

"The amount of processing that Turismo is designed to provide in such a small footprint is simply astounding," he said. "We expect that our new Cell processor-based offering will truly make a difference for many customers in solving problems that require this caliber of performance density in an affordable solution."

Representatives at the Mercury booth were cagey about Turismo details. "NDA, NDA, NDA," they said, as we recoiled. Even the Turismo artwork was light on information being nothing more than a picture of a rectangle with words like "powerful" and "super" around it.

Mercury has been hyping a Cell-based blade server for some time. Trial systems are in customer's hands and volume shipments will start early next year. It fits into IBM's BladeCenter chassis, and seven of the dual-Cell blades slot into 7U box.

Mercury has taken the clear lead in Cell server marketing and stands as the major hardware backer to date of IBM, Sony and Toshiba's multicore chip.

The Turismo system will hold four Cell BE (Broadband Engine) processors, have dual 4X InfiniBand support and "multiple" Gigabit Ethernet ports. The system will also run Yellow Dog Linux.

Customers, however, will have to wait awhile for Turismo to arrive. It should be around in limited quantities in the third quarter of 2006 with volume production in early 2007. Until then, it's blades only. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.