Free Essay

Top Ten Computers

In:

Submitted By rayonxlent
Words 373
Pages 2
Top ten computers in the world

1) The Tianhe-2
Runs on a version of Linux that is relatively popular in the Asian region known as Kylin-linux.
Its main purpose includes traffic light controlling (which is necessary for managing the rush hour traffics that are known to affect China), predict earthquakes (that are common in Asia), design cars and create movie effects.

2) Titan
Also runs on a Linux version specific to its inventors which is “Cray” Linux environment and was previously the number one super computer before The Tianhe-2.
Its main purpose surrounds research in energy (alternatives) and climate change.

3) Sequoia
This US based supercomputer runs on the Linux and was dethroned by the Titan himself.
Its main purpose surrounds the NNSA (National Nuclear Security Administration)’s management of the country’s nuclear stockpile.

4) K Computer
The Japan based super computer runs on the Linux OS and just like the previous 2 supercomputers was dethroned.
Its purpose revolves around power sustainability of the world’s resources, health care, climate change, and industrial as well as space exploration issues.

5) Mira
Is another US based supercomputer that also runs on Linux OS.
Its purpose includes solve complex calculations that the INCITE
(Innovative and Novel Computational Impact on Theory and Experiment) Program sees fit, research leadership computational challenges, and also calculate computations that are urgently needed to be done.

6) Piz Daint
The Switzerland based supercomputer runs on the same “Cray Linux environment” as number 2 on the list.
Uses of this super computer includes: simulating projects of importance in the scientific community and parsing of massive data sets.

7) Stampede
This also runs on the Linux OS and for the most part serves the scientific community as long as it is available to carry out any scientific endeavor. 8) JuQueen
This supercomputer is Linux based and just like stampede serves the scientific community given that is available.

9) Vulcan
Vuclan is also has a Linux based OS and is used for researches most scientific fields.

10) Super MUC
Like the top 9 super computers on the list uses the Linux OS and more specifically used for research in Fluid dynamics, genome analysis, computational chemistry, earthquake simulation, medicine and astrophysics. ters in

Similar Documents

Premium Essay

Case

...Jamal Walker Dr. Khan BUAD 327.001 9 October 2013 Case study 2 My first impression of the country rankings of doing is some of the countries I have never heard that were considered the top ten of doing business. Also my first impression is what makes them number I have never heard of the country. So that opened my eyes to some other places that are said to do business in a very efficient way. The unique thing about the countries in the top ten is that they in the top ten in at least three categories including the ease of doing business. The unique part about the countries not ranked in the top ten is there is a good amount of them that are ranked higher in some categories then countries in the top ten. Looking through the methodology it doesn’t really strictly talk about how much business they do. Really doesn’t talk about the size of the project they are working on rather than how long it takes them to do the project. One country could be working on things that are bigger than what the other country is doing but since they finish first they look better. There is nothing that shows how hard it may be in certain places to break barriers to start a business. Those other countries may not have ventured into because they know its tuff to start something. I don’t believe that EDB captures all of the key determinants because they just recently added some new which means that this was not good enough from the beginning. Then they could also be put into different categories by what...

Words: 801 - Pages: 4

Premium Essay

Treat

...Derrell Reese With the variety of threats to worry about in regards to protecting one’s computer system, whether it is for a personal or professional computer, it is very important to get some type of security protection. There are a lot of choices out there in terms of what brand and what level of security an individual is looking for. The best option to defend a computer system from various threats is an all-in-one computer security system, such as Norton 360 and McAfee Total Protection. One problem an individual needs to care about is identity theft. Identity theft can range from a stealing a person’s name, email address, physical address, credit card information, account numbers, documents, and even passwords. Other threats or aggravations to worry about are spyware, adware, pop-ups, spam, viruses, and worms. Keeping the computer system and the data limited protected within the computer is vital. The all-in-one computer security systems are current in a way that it protects one’s computer from all the threats previously stated, spyware, viruses, and identity theft all-in-one package without the user having to worry about anything. An included feature is filter protection for any incoming and outgoing email for any virus and spam threats. Another threat that these all-in-one computer security systems are effective is they help protect one’s computer from hackers, and come with a built-in firewall that helps keeps all these threats away. These security systems are automatically...

Words: 435 - Pages: 2

Premium Essay

Juju

...Instructional Design © Copyright Harold Henke, 1997, 2001 all rights reserved Author’s note: This paper was written in 1997 as a project paper for a course on Human-Computer Interaction. This paper was reformatted in June, 2001. Page 2 Table of Contents List of Illustrations...................................................................................... 3 List of Tables............................................................................................... 3 Chapter 1: Introduction .............................................................................. 4 Problem Statement .................................................................................... 4 Chapter 2: Literature Review ...................................................................... 5 Definition of Web-Based Instruction............................................................. 5 Importance of Web-Based Instruction ........................................................... 5 Web-Based Instruction Design Issues ........................................................... 6 Chapter 3: Methodology Design .................................................................. 7 Top Ten Web Design Mistakes ..................................................................... 7 Interface Design for Computer-based Learning Environments........................... 8 Measurement Scores .................................................................................. 9 Anticipated...

Words: 6250 - Pages: 25

Premium Essay

Assay

...by a company, to maintain its leadership in the domestic market, and emerge as a global player » The need for globalization and the factors that must be taken into account when a company wants to go global » The measures by which a company can create a global brand » The challenges facing Lenovo in its efforts to go global Introduction In December 2004, the China-based Lenovo Group (Lenovo) announced that it had acquired the personal computer (PC) division of the US-based IT major IBM. Industry analysts termed this as a major milestone for Lenovo in its efforts to globalize its operations. It was also perceived as an important step towards achieving the company's goal of becoming a Fortune 500 company by 2010. According to Liu Chuanzhi (Chuanzhi), the Chairman of the Group, "The purchase will make Lenovo Group the third largest PC maker worldwide with an annual revenue exceeding 10 billion US dollars."2 Lenovo, formerly known as Legend, is Asia's leading and world's ninth largest PC manufacturer (Refer Exhibit I for top ten PC companies in the world). By the end of 2003, Lenovo had captured a 27 percent market share of the PC market in China. In the fiscal 2003, Lenovo manufactured around 4.5 million PCs including...

Words: 1061 - Pages: 5

Free Essay

Factors Affecting Study Habits

...The 2012 Computer Trends 1. Touchscreen PCs with Window 8: Microsoft’s new OS Window 8 is expected to launch in October 2012, but there are still speculation revolving around about its release. It’s likely that in few months you will be seeing Window 7 products in the market with a tag saying ‘Windows 8 ready’. Only by the end of this year or may be in starting of 2013 we will get a chance to see an actual Window 8 running device. There are rumors that HP Slate 8 might be the first tablet to have the Window 8 OS, but there are not details about its release date or price details. 2. When Intel high-end CPUs Hits Market: At CES 2012 Intel was mum about its next generation of CPUs which are dubbed as Ivy Bridge. We hope that even if there is a short delay the Intel's higher-end third generation Core i series of CPUs will become a standard in all new desktops and laptops before this Christmas. The history of market trends shows that there will be a lot of improved mainstream parts in the market after the Intel’s high-end CPU hit the stores. 3. A Refresh to MacBook and Mac Pro: From the past three we haven’t seen any change in MacBook Pros design and we surely expect a refreshed model of MacBook from Apple this year. With the new Intel high-end processors we can dream of a slimmer and more powerful Pro model or a hybrid of Pro and Air is also a possibility. It’s for sure that there will be a major update in MacBook Air as Apple will be...

Words: 905 - Pages: 4

Premium Essay

Technology Is a Positive Influence in the Education Field

...Technology is a Positive Influence in the Education Field Everywhere you look there are computer games, but it just isn’t the fun computer games anymore, they are making more and more learning programs. I have seen learning programs from the preschool level all the way up to the college level. I think this is wonderful it gives children or young adults the chance to practice at home or even before the class the starts, it gives you a little introduction. I have a six year old sister who uses those programs all the time, and they help her. When she was in preschool it helped her count and now the levels are getting harder now that she is in first grade. My family, me especially because I am going into the education field think that these programs are very beneficial, they help the students get a good grasp on things. I think technology has positively impacted the education field. When I see my little sister practice and play on the computer I can tell it is helping her in her school work, but at the same time she is enjoying it. Because it is on the computer it doesn’t feel like she is doing homework or school work, but in her mind she is playing on the computer, for fun. I know for the most part many people use these programs as an introduction to a course or for a certain grade level. This helps the student prepare themselves for the up coming tasks. These computer programs allow students to get their feet wet before they go in for the dive. During my senior year...

Words: 1395 - Pages: 6

Premium Essay

Ethics

...Computer Ethics By Brenda B. Covert |    | | 1     Ethics is a short, two-syllable word of six letters that affects every segment of our lives. Ethics is a moral code involving a clear understanding of right and wrong. Another word for ethics is values. When people talk about ethics, they may be focused on one specific area, such as business, medical, political, environmental, religious, or personal ethics. Today we are going to focus on another important area of ethics: computer ethics.   2     If you have good computer ethics, you won't try to harass or hurt people with your computer, and you won't commit crimes such as information theft or virus creation. The problem that often arises when some of us are on a computer is that we don't see the harm in snooping in another person's private information or trying to figure out their passwords. It seems smart to copy and paste information into a school report and pretend that we wrote it. (Even if the information were public property --which most of it isn't-- that would be dishonest.) The crimes committed with hacking or gaming scams may not seem harmful because the victims lack faces. Flaming (aiming abusive, insulting messages at another person online) seems risk-free since we are anonymous. Indulging in obscenities and other offensive behavior online might feel empowering simply because no one knows who we really are. No one is going to come knocking on the door and demand a physical confrontation. However, every one of those...

Words: 1135 - Pages: 5

Premium Essay

Apple

...APPLE INC. Grantham University Abstract Apple Inc. is a company that is on top and still continues to rise. The company continue to design top notch products for everyone to enjoy. From Macbooks to Ipods, Ipads, and Iphones, Apple is just taking technology to a new level. Apple sells its products world wide through online stores, retail stores, and third party resellers. Apple does a fantastic job when it comes to advertising. From television commercials to print ads, Apple has been very successful with all the great products Apple has to offer. How can you not love Apple Inc? Apple Inc. Apple Inc are the best example of a company that has completely influence an entire nation. Apple Inc has maintained on extraordinary image with stunning modern design, appealing usability and durable function. Apple is really involved in two businesses; the computer market and the entertainment and media market. Its approach has been to integrate its new products around its core industry to construct a digital lifestyle that surpasses not only its line of computers but its new product such as Ipads, Ipods, the Iphone and online services such as Itunes. Apple Inc manufacture and market personal computer, portable digital music players, and mobile communication devices and sell a variety of related software, services, and networking solutions. Apple sells its products worldwide through its online stores, its retail stores...

Words: 883 - Pages: 4

Premium Essay

Are Franchises That Use “Best Practices” in Social Media More Successful Compared to Those Franchises That Do Not Use Such Practices in Social Media?

...Are Franchises that use “Best Practices” in social media more successful compared to those franchises that do not use such practices in social media?   Are Franchises that use “Best Practices” in social media more successful compared to those franchises that do not use such practices in social media? Introduction: I am a newbie to this thing called Social Media. I do not have a facebook page, don’t go on YouTube, and I have never tweeted. I was forced to utilize texting on my phone in order to communicate with my two sons during their teenage years. Now they are in college and I text them all the time. If I didn’t then I would have never interacted with them during their late high school and college years. The research paper that follows is my introduction to everything Social Media has to offer. I have tapped into many online resources, se the complete list on Appendix A. The topic of my research paper is, “Are Franchises that use “Best Practices” in social media more successful compared to those franchises that do not use such practices in social media?” What is Social Media? Webster dictionary defines “Social Media as forms of electronic communication (as Web sites for social networking and micro blogging) through which users create online communities to share information, ideas, personal messages, and other content (such as videos).” Everyone in the world has gone crazy over revealing everything about themselves on the internet and want other people to know...

Words: 3060 - Pages: 13

Premium Essay

Goals Essay

...found in almost every MBA application to show that you have clear direction and purpose based on experience and planning. Business school is not another opportunity to "find yourself." 8:00 AM. July 1, 2030. The 23rd floor of the Bank of China Tower in Hong Kong. A woman sitting behind the mahogany desk calls a Shanghai trader to buy 200,000 shares of Alibaba stock. Moments later, she dashes into a videoconference with Tokyo analysts. When the conference finally concludes two hours later, the woman rushes down the stairs, hails a taxi to the Hong Kong International Airport, catches a flight to Thailand, and ends her day with a meeting with the CFO of Asus Computers. I look forward to maintaining this busy schedule as a portfolio manager of an international equity fund about ten years after obtaining my MBA. The Top School academic experience can build on my public accounting training and my multi-cultural and multi-lingual background to prepare me for work first as an equity analyst in the mutual fund industry and ultimately as a portfolio manager specializing in Asian Pacific equities. As a CPA and staff accountant with Big 4 for the past two and a half years, I have developed a solid foundation in teamwork, analytical, and problem-solving skills. As a bilingual associate of the Asia-Pacific Business Group, I specialize in auditing the financial statements of in-bound Asian businesses. However, while Big 4 provides expansive career opportunities in public accounting...

Words: 546 - Pages: 3

Premium Essay

Subnetting and Ipv4 Addresses

...Network and Host IDs * Address Classes, classful and classless address schemes * Minimising wasteful use of IP addresses * CIDR * Subnetting * VLSM * Health and Safety * Evaluation * Bibliography Binary Computers see things in terms of binary. In binary everything is described as having two values or states: on or off, true or false, 1 or 0 and yes or no. A light switch could be regarded as a binary system, since it is always either on or off. As complex as they might seem computers can be regarded as a box full of light switches. Each switch is called a bit which is short for binary digit and a computer can turn each of these bits on or off. The computer describes 1 as being on and 0 as being off. By itself, a single bit is kind of useless, as it can only represent one of two things. Imagine if you could only count using either zero or one. Alone, you could never count past one. On the other hand, if you got a bunch of friends together who could also count using zero or one and you added all your friends’ ones together, your group of friends could count as high as they wanted, dependent only on how many friends you had. Computers work in the exact same way. By arranging bits in groups, the computer is able to describe more complex ideas than just on or off. The most common arrangement of bits in a group is called a byte, which is a group of eight...

Words: 2448 - Pages: 10

Premium Essay

Windows Mac Linux Security

...Security Mac Viruses Many Mac users believe their systems are impervious to threats. This is a naïve falsity of course because no computer system is invulnerable. It is a known fact that Windows can be very prone to virus infections, but since there are so little Mac viruses, people like to get it in their heads that it isn’t possible. Mac OS X is built on the UNIX kernel, one of the most secure operating systems. UNIX creates a file system in which the user isn’t the most powerful role on the computer and needs root permission to really make any major changes. It is technically more secure, but the only other real benefit is that Apple doesn’t populate a large percentage of the PC marketplace. Apple used to encourage this way of thinking, but after the Flashback virus (Perlroth, 2012), they decided it wasn’t a good idea to lie to their customers. Apple replaced their “Why you’ll love a Mac” website containing “It doesn’t get PC viruses” to “It’s built to be safe” (Mlot, 2012). Since malware really only exploits existing bugs or holes in an operating system, it is up to Apple to fix those holes, and they do a pretty good job of it. But in any case, it’s better to be safe than sorry. Some pretty good Mac antivirus include MacKeeper, Kaspersky, and Trend Micro (Sutherland, 2014). Preventative Maintenance With the threats to OS X made real, there are some simple tricks to keep a Mac up and running. The first of which is the ever-important data backup. Time Machine, is Apple’s...

Words: 2141 - Pages: 9

Premium Essay

Pirates of Silicon Valley

...him. How cruel and stupid Bill did to Steve, after he gotten everything to Steve Jobs he immediately relinquished the entire corporation of Steve. I felt so devastated for him perhaps because of Steve’s attitude brought him down. On the other hand of the movie, it shows that Steve is just an ordinary person who also faces failure. Every person who is already on top cannot avoid any failures in their every endeavor. Still you should fight this and continue to develop what is in your mind, not to become a failure one. The success of Steve Jobs includes his faith, passion, courage, innovation and his vision. Faith, in a way that he didn’t know what he is doing in his life and what should be his carrier all about. He still continues to pursue what he thinks and believes that maybe he is the one who could change how people thinks in the manner of technology. Having a faith could lead you in a right way that could even be the reasons what you are become. As what they say, what we are is God’s gift to us but what we become is our gift to God. Passion, in Steve Jobs whole life he always engage himself in personal computers. He even dropped out to his school to focus his...

Words: 735 - Pages: 3

Free Essay

Nt1110 Analysis 1: Memory Cost

...Memory Cost By Frank Bolton Phillips NT1110 Friday 6p.m. This is to help me discover and appreciate the difference in the cost of RAM and ROM in today’s market as well as where is where it came from and where it is going. It is easy to find information on this subject as everyone seems to want in on the computer boom and profit from the ever growing demand for faster computers with huge memory. Ten years ago you would have found yourself spending over $2,000 to get just 1GB of RAM. As computer manufacturers recoup cost of R&D, the prices start to drop. Today it would only cost around $20 to purchase the same 1GB of DDR3 providing considerable savings over a decade ago. What appears to be the best deal for the money is 2GB on RAM which runs around $40 and slows enough memory to run most applications. There are other types of memory available to all of us if you’re willing to pay the price of admission. For example, some of the more exotic types of RAM can still run hundreds, even thousands of dollars. For instance, I found Super Talent 1TB STT RAID DRIVE GS RAID0 for $4,815.00 on Memory Suppliers.com. They also offer iRam 2GB (2 x 1GB) DDR2 SDRAM PC2-5300 667MHz for $119.00. I find this is a very nice web site that is easy to navigate through and find and compare the memory you’re looking for. The following table I got from Archive Builders web site. It shows the growth to cost difference for 32 years. This was determined by the increase of the density of disks...

Words: 928 - Pages: 4

Premium Essay

International Business

...supply several components for its next release of legacy products. Phoneson has a reputation for producing best in class brands of electronics, and is recognized for cutting edge technology and aesthetic design. It has built a loyal following from electronics enthusiasts in its native Japan as well as other Asian and European electronics markets. Phoneson wants to extend its brand into the highly competitive North American market and sees standard Internet and GPS functionalities in its cell phones and PDAs as the key to its success. In order to offer its products as a high end alternative to the established North American competitors and at its existing top market price, Phoneson has decided to spend millions of dollars on aggressive marketing. It plans to cut production costs by having Semicontronics produce its computer chips instead of its existing...

Words: 746 - Pages: 3