Chapter 286: The epoch-making Xeon Chip

In this regard, Lin Chenyi was not surprised at all.

The Xuanyuan Xeon chip is rated as high as 7 stars, which also means that the Xuanyuan Xeon chip is different.

This difference includes the architecture of the chip, the manufacturing process of the chip, and the related technology for building a supercomputer!

Supercomputers are not something that can be built, nor are they as simple as crudely stacking CPUs together!

Cao Feng told Lin Chenyi that the architecture design technology shown in the document is completely epoch-making design, which can make the supercomputer build achieve higher hardware utilization.

Taking Sunway Taihu Light as an example, it adopts a shared pure storage architecture, and the gap between the measured peak and the theoretical peak is not generally large, and the hardware utilization rate reaches %.

This utilization rate is actually very high, and the performance of supercomputing is not something that can be improved, but requires continuous optimization of various software and hardware, of which the most critical technology is architecture design.

If the supercomputer is an army, then the architecture design is the historical inheritance, organization and management level, military training level, strategic command level of army generals, etc., and the CPU is the soldiers of this army.

Specifically, the architecture includes data processing mechanism, system software, telling network, storage array, etc., and a more optimized combination design can improve the utilization rate of hardware.

At the same time, the measured performance of supercomputing depends greatly on the high-speed Internet network, which tells us that the Internet network is not the Internet network that we ordinary people understand, it is the professional technology of supercomputing, and it is the key to the performance of supercomputing.

The more CPUs a supercomputer has, the more compute nodes there are between them, and the more stringent the latency requirements for transfers between them.

Insufficient efficiency of the Internet network will lead to data congestion and reduce the efficiency of the supercomputer system.

Taking Sunway Taihu Light as an example, it consists of 40 computing cabinets and 8 network cabinets, covering an area of 605 square meters.

Among them, each computing cabinet has four supernodes composed of 32 computing plug-ins.

Each plug-in is composed of four computing node boards, and one computing node contains two "Shenwei 26010" high-performance processors, so as to form a very efficient high-speed network and create a supercomputer with ultra-high computing.

The operating system of the supercomputer also helps to improve the utilization of hardware, and the self-created operating system can ensure greater security.

The reason why the document of Xuanyuan Xeon chip-related technology is so large is because it includes the entire industrial chain technology for manufacturing Xuanyuan Xeon chips!

Among them, the core technology is naturally the Xuanyuan Xeon chip itself, which adopts different architectures on the market, neither X86, nor others, but the S01 architecture named by the system.

The chip architecture is the algorithm of the chip, it is the instruction set of the chip, which can better play the performance of the chip, and the current mobile chips are based on the ARM architecture, without this architecture, all mobile phones will become a brick.

And a Xuanyuan Xeon chip, equipped with the S01 architecture, will play 8tlops of theoretical floating-point operation!

This is a very terrifying data, even if the vertex supercomputing chip that ranks first in supercomputing is only about 3.1tlops!

In addition, with the assistance of the S01 architecture and other technologies, it can be used to build a supercomputer, which can achieve 80% hardware utilization!

At present, Sunway Taihu Light's domestic chip "Shenwei 26010" has been put into the commercial field, with a peak performance of 3Tlops of a single chip, and due to its simple structure, it is not as complex as a supercomputer, and can exert nearly 100% performance.

The technology of transmitting to server 0 has relevant technical data on the construction of the Xuanyuan supercomputer, and there is also the technology that can carry the Xeon chip to the personal CP.

In other words, whether it is a supercomputer, an enterprise-level server, or a super-powerful personal PC, the use of Xuanyuan Xeon chips can beat all competitors on the market.

After Cao Feng explained as straightforwardly as possible, Lin Chenyi immediately understood the value of this technical information.

It can be said that as long as a group of professional and technical personnel are found, they can fully realize all these technologies and create their own domestic chip empire.

Each Xuanyuan Xeon chip is as high as 8tlops, that is, 8 trillion times of terrifying performance, crushing to the current list of supercomputing has no temper, even if it is country M, it is impossible to reach this level without more than ten years of catching up!

"Xuanyuan, encrypt the relevant information of the Xuanyuan Xeon chip, the top secret level is level 1, and only personnel above the level of authority are qualified to view it.

At the same time, once you find that someone is trying to invade, you will directly send out an alarm and cut off the physical connection! ”

"Sir, encryption is complete......"

"Cao Feng, come here, Xuanyuan, give Cao Feng first-level permission!"

"Sir, establish a first-level authority Cao Feng, information in progress, face data entry, behavior dynamic data entry, voice entry ......"

"Sir, it has detected that there are a large number of vulnerabilities in the servers of your industry, Star Group, and the security level is low, do you want to take over the enterprise servers of Star Group?"

Lin Chenyi looked at the screen in surprise, Xuanyuan's intelligence is too high, can he independently judge the status of his industry?

"Take over, and establish access to the relevant high-level ......"

"Sir, a list of permissions has been listed, do you agree with the scheme?"

The permission scheme given by Xuanyuan is calculated based on the current position of the Star Group, and Lin Chenyi is the only super administrator.

Then Hu Na, Cao Feng, and Lin Yumo have first-level authority, with a total of three people.

The vice president level of the group has second-level authority, with a total of four, and so on.

Combined with the salary level and post level for all employees of the Star Group to give the corresponding authority, the lowest level is the ninth level, in the future, the Star Group will implement full intelligent operation, equipped with some corresponding daily office software, the efficiency is definitely much higher than now.

In addition, the escalation of authority is determined by Xuanyuan Intelligence, and the person who promotes the authority must have a written application, a statement of employment, and an electronic license for a higher authority, and no demotion is required.

At the same time, the authority above the third level is directly appointed by the super administrator, and even the first level of authority does not have the right to modify the permission level without authorization.

Some of the more important company secrets require level 3 or more to be viewed, preventing hackers or commercial espionage from stealing trade secrets.

As for whether someone will forcibly break into the Star Group's server or attack the server in reality, there is no need to worry too much about this for the time being.

At present, there is nothing special about the Star Group that has attracted the attention of others, and Xuanyuan has taken over the enterprise servers of the Star Group.

Once the Star Group is forcibly attacked by hackers and the server crashes, it will trigger the self-destruction program arranged by Xuanyuan on the Star Enterprise server, and perform repeated low-level formatting, which will physically damage the Star Enterprise server.

As for the damaged data, there is no need to worry, because at this time, the No. 0 server has been synchronously associated with the enterprise server of the Star Group, which naturally includes the backup of data.

Once the enterprise server is breached, while repeatedly low-level formatting, server 0 will also cut off the connection to the Star Enterprise server and the Internet, even the most awesome hackers will not be able to invade a server that is not connected to the network!