Skip to main content
SHAVIRA KHAIRUNISSA DEVIE

106218005, IR A

[ Assignment for Pengantar Teknologi Informasi ]




Today I wanna talk about Supercomputer. What is make supercomputer become highly super system? The secret behind supercomputer? Okay, we've known a long way ago that MITS developed the first personal computer in 1974, which was sold and help as a tool that the customer use for their daily activities also assemble the machine themselves.

I will try to be as up-to-date and compactly report as possible. Also on these grounds I think there is a place that the supercomputer market is a very dynamic, the number of vendors that sell has boomed accordingly. At anytime we know one of the most powerful and fastest computers to solve the scientific and engineering problems or significant amount of data very quickly isSupercomputer. A well-adopted metric is the number of floating-point operations per seconds (FLOPS) such a system can carry out for the operation itself. The supercomputer, you can also said that this computer can operate up to nearly a hundred quadrillions of FLOPS. Well, we know that supercomputer have improved significantly overtime.

The importance characteristics of supercomputer cannot be measured by their processing capacity but rather the processor intensive visualisation require for both speed and effectiveness that used for scientific and engineering computing. The scientist and engineers will build models of complex processes then they'll simulate the processes in a machine have included national security, weather forecasting, fluid mechanics, radiation modelling, CGI rendering for popular movie and also for medicine like USG tools or finding new uses for marketed drugs, nuclear weapon design, and cryptography. By the way, due to their size and cost, supercomputers are really rare and only for use by large corporation, universities, also government that can afford them all. Supercomputers also often shared to give the researchers for access many information through the machine. Many individuals can access too at the same time however supercomputer can support the extremely high computation speed of CPUs.





As a result, access to supercomputer is a important key to create innovation and boosting competitiveness country in science also in industry like global race countries such as USA, Japan, China, or in Europe is dedicated to providing world-class high technology computing performance resources and services with a single point of access. The example of the fastest supercomputer in the world was The SUMMIT  by the US Departement of Energy's Oak Ridge National Laboratory [ORNL] currently taking the top rank from China's supercomputer SUNWAY TAIHU LIGHT for the first time in 6 years.

This is the end of my overview about supercomputer. I want you all critics and suggestions to my report for create better and fact fun article for the next time post. Thank you so much for reading my report. God bless you^^



References:



(1)    R. Chandra, L. Dagum & R. Menon, (2001), Parallel Programming in Open Mp, Morgan Kaufmann Publisher Inc., January. 
(2)   A. J. van Der Steen, ed, (1995), Aspect of computational science, NCF, The Hague.
(3) H.W. Meuer, E. Strohmaier, J.J. Dongarra, H.D. Simon, (2007) Top500 Supercomputer Sites, 29th Edition, June 2019, The report can be downloaded from: www.top500.org/
(4)   John L Hennessy and David A Patterson, (2017), "Computer Architecture – A Quantitative Approach (6th edition)”,  Morgan Kaufmann Pub. Inc.

Comments

Popular posts from this blog

Artifical Neural Network

Artificial Neural Network  is a computational model based on the structure and functions of biological neural networks. Information that flows through the network affects the  a neural network changes or learns, based on that input and output. So the point is  to create a computational system that could solve problems like a human brain. The Neural Networks was founded by  Warren McCulloch and Walter Pitts in 1943. Then it was upgraded with AI (Artificial Intelligence) in 1975 by Kunijiko Fukushima called Artificial Neural Network (ANN) .   Warren McCulloch and Walter Pitts Today  Neural Networks are important in information age, because help society to solve complex problems in real life condition. They can learn from model the relationships between inputs and outputs that are nonlinear and complex; make generalizations and inferences; reveal hidden relationships, patterns and predictions (such as financial time series data) and varianc...

RFM in Business Strategy

RFM Analysis For Successful Customer Segmentation Analysis RFM in Big Data RFM (Recency, Frequency, Monetary) analysis is a proven marketing model for behavior based customer segmentation. It groups customers based on their transaction history – how recently, how often and how much did they buy. RFM helps divide customers into various categories or clusters to identify customers who are more likely to respond to promotions and also for future personalization services. RFM analysis evaluates which customers are of highest and lowest value to an organization based on purchase recency, frequency, and monetary value, in order to reasonably predict which customers are more likely to make purchases again in the future. What are Recency, Frequency and Monetary? ·         Recency      : How much time has elapsed since a customer’s last activity or transaction with the brand. ·     ...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...