Feeds

Concurrent unhoods RedHawk Linux 5.4

Real-time is real money

Mobile application security vulnerability report

With Red Hat, Novell - and now Intel, thanks to its $884m acquisition of Wind River - all crowding into the real-time Linux space, Concurrent has to keep on its toes and keep its RedHawk Linux, well, current.

With RedHawk Linux 5.4, announced Tuesday, Concurrent is slipping into Linux 2.6.31 and offering full compatibility with Red Hat Enterprise Linux 5 update 4. That's because RedHawk is a tweak on Red Hat, adding real-time extensions and other goodies cooked up by Concurrent to make it different from Red Hat's own Enterprise MRG real-time Linux.

With this update, RedHawk Linux is able to take advantage of all the power management and virtualization features of the latest enhancements to Intel's Xeon 3400, 3500, and 5500 processors, which sport the QuickPath Interconnect, as well as the most-current six-core Opteron 8400s and their HyperTransport interconnect. The real-time Linux from Concurrent is also updated for new chipsets from Intel and AMD, and provides support for PCI-Express 2.0 peripherals.

Concurrent says that it has also done tweaks in the memory subsystems so that NUMA clustering of processors on a motherboard using QuickPath and HyperTransport can be used to huddle real-time processors running on a particular CPU with the memory pages it needs to run those processes most efficiently. NUMA architectures can leave processors in one socket and memory in another, which slows down performance considerably. This may be just an annoyance with a generic operating system, but it can be deadly in a real-time OS.

RedHawk Linux knows how to replicate software libraries and modules around a group of processors and their memory, to allow a kind of parallel processing to boost performance of a specific code set if needed. RedHawk Linux 5.4 can span up to 48 x64 cores in single system image (that's eight six-core Opterons) - the prior release topped out at 32 cores.

This latest real-time Linux release from Concurrent also sports the latest video drivers from Nvidia and embeds the CUDA parallel programming toolkit as well, which means numerical calculations can be dispatched to Nvidia graphics cards within a system or to Tesla co-processors (basically outboard video cards with supercomputer ambitions) attached to the system through the PCI-Express bus. ®

The Essential Guide to IT Transformation

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
Apple: We'll unleash OS X Yosemite beta on the MASSES on 24 July
Starting today, regular fanbois will be guinea pigs, it tells Reg
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.