Feeds

Concurrent unhoods RedHawk Linux 5.4

Real-time is real money

The Power of One Infographic

With Red Hat, Novell - and now Intel, thanks to its $884m acquisition of Wind River - all crowding into the real-time Linux space, Concurrent has to keep on its toes and keep its RedHawk Linux, well, current.

With RedHawk Linux 5.4, announced Tuesday, Concurrent is slipping into Linux 2.6.31 and offering full compatibility with Red Hat Enterprise Linux 5 update 4. That's because RedHawk is a tweak on Red Hat, adding real-time extensions and other goodies cooked up by Concurrent to make it different from Red Hat's own Enterprise MRG real-time Linux.

With this update, RedHawk Linux is able to take advantage of all the power management and virtualization features of the latest enhancements to Intel's Xeon 3400, 3500, and 5500 processors, which sport the QuickPath Interconnect, as well as the most-current six-core Opteron 8400s and their HyperTransport interconnect. The real-time Linux from Concurrent is also updated for new chipsets from Intel and AMD, and provides support for PCI-Express 2.0 peripherals.

Concurrent says that it has also done tweaks in the memory subsystems so that NUMA clustering of processors on a motherboard using QuickPath and HyperTransport can be used to huddle real-time processors running on a particular CPU with the memory pages it needs to run those processes most efficiently. NUMA architectures can leave processors in one socket and memory in another, which slows down performance considerably. This may be just an annoyance with a generic operating system, but it can be deadly in a real-time OS.

RedHawk Linux knows how to replicate software libraries and modules around a group of processors and their memory, to allow a kind of parallel processing to boost performance of a specific code set if needed. RedHawk Linux 5.4 can span up to 48 x64 cores in single system image (that's eight six-core Opterons) - the prior release topped out at 32 cores.

This latest real-time Linux release from Concurrent also sports the latest video drivers from Nvidia and embeds the CUDA parallel programming toolkit as well, which means numerical calculations can be dispatched to Nvidia graphics cards within a system or to Tesla co-processors (basically outboard video cards with supercomputer ambitions) attached to the system through the PCI-Express bus. ®

Seven Steps to Software Security

More from The Register

next story
Whoah! How many Google Play apps want to read your texts?
Google's app permissions far too lax – security firm survey
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
OpenWRT gets native IPv6 slurping in major refresh
Also faster init and a new packages system
Microsoft's anti-bug breakthrough: Wire devs to BRAIN SCANNERS
Clippy: It looks your hands are shaking, are you sure you want to commit this code?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.