Feeds

You've got $60k: So, 2013 sporty Corvette, or a year of AWS's new I2 beast?

244GB of RAM, 6400GB of SSD, 32 virtual CPUs at Amazon's Virtualization Palace

Combat fraud and increase customer satisfaction

Amazon has soothed developers miffed at the notorious variability of its rentable servers with a new expensive class of reliable instances.

The "I2" instances were officially launched by Amazon on Friday after being previewed at its AWS re:invent show in November, and see the company bring SSD-backed servers with fast networking to seven of its ten global data center hubs.

The four new instances range from 30.5GB of RAM, 800GB of SSD storage, and four virtual CPUs for $0.85 per hour all the way up to the titanic i2.8xlarge instance – 244GB of RAM, 6400GB of SSD, 32 virtual CPUs for $6.82.

The latter configuration will set you back $59,743 for a full year of operation, or $27,871 for 12 months if buying via a one-year "medium utilization" contract. The $60k cost is roughly equivalent to six reasonably well-specced Dell PowerEdge R910 servers with 64GB of RAM and two ten-core Xeon E7-4850 processors, albeit not including the electricity and other infrastructure bills, or simply a 2013 Chevrolet Corvette grand sport convertible.

A quick analysis via El Reg's stat-o-matic cloud model shows this (on-demand price-per-hour, Linux-based) pricing tracks Amazon's general model, and slightly tightens competition with Google's Compute Engine.

The instances mandate the use of Linux, rather than Windows, as they only support hardware virtualization (HVM) machine images – which requires use of either the Amazon Linux image, or virtual machines with version 3.8 or later of the Linux kernel.

Amazon Web Services RAM versus Google graph

The I2 instances, labeled red "Amazon new", close in on Google's generous RAM allocations (click to enlarge)

As with many other Amazon instances, these ones depend on whopping great Xeon processors from Intel. In this case, the E5-2670 v2 (Ivy Bridge) chips, which come with support for Advanced Vector Extensions, Turbo Boost, and Non-Uniform Memory Access (NUMA).

All four of the instances use the "Enhanced Networking" AWS feature, which uses single-root IO virtualization (SR-IOV) to give instances a higher packet-per-second rate and lower inter-instance latencies.

SR-IOV lets single PCIe devices such as network adapters expose themselves up to virtual machines as a variety of distinct hardware surfaces with a physical function.

By adding these capabilities to the instances and combining them with the large SSD allocations, Amazon is ensuring that the new servers will have more reliable performance than some of the low-cost virtual machines, and that they can be used to run multiple IO-intensive applications such as real-time web-oriented databases. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
It's GOOD to get RAIN on your upgrade parade: Crucial M550 1TB SSD
Performance tweaks and power savings – what's not to like?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
IBM rides nightmarish hardware landscape on OpenPOWER Consortium raft
Google mulls 'third-generation of warehouse-scale computing' on Big Blue's open chips
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.