Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core

Part 1 Part 2 Part 3 Part 4
 
 

A new stack of AMD products


 
Monsters after the holidays: AMD Threadripper 2990WX 32-Core and 2950X 16-Core  
 
The kingdom for high performance. When it comes to data processing, bandwidth becomes a key factor: the more a user can do, the more projects will be executed, and the number of contracts will increase accordingly. Workstation users often calculate bottlenecks in the system and like to throw resources to solve the problem, whether it's core, memory, or graphics acceleration. The second-generation Threadripper, known as Threadripper ? goes beyond the old kernel-to-price ratio: the 2990WX provides 32 cores and 64 threads for just $ ...[/h]
+ 0 -

Strength check: Termite LT45? LXI

By the beginning of the 1990s, modern personal computers, simply PCs, had replaced cryptographic machines and other specialized cryptographic devices. Often, it was necessary and necessary to work with such encryption machines in the military conditions. Therefore, reliability and strength are the two most important parameters in the development and creation of military portable PCs. Remain unharmed and fully functioning, passing fire, water and copper pipes!
 
 
Strength check: Termite LT45? LXI  
CryptoMuseum
 
 
 
 
Thank you for staying with ...
+ 0 -

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space mission

Bunker for the date: how I was allowed to walk through the RUVDS data center in the territory of the space missionSomeone likes to go to the movies, someone likes to go to clubs, someone likes to go to museums - and I've long dreamed of walking around data centers, looking at everything with my own eyes, chatting with those who work there. But to organize all this seemed unreal. Fortunately, a certain recognizability, which earned poiskvps.ru for these years, and which now, sometimes, surprises me - simplified the most difficult: acquaintance. So for the last two months I visited two data centers. What I saw interesting in St. Petersburg, I still plan to write later. And today I will tell you how I saw ...
+ 0 -

10 of the fastest supercomputers in the world. 2018

Two months ago, in June, the Top500 list was published. Top500 is a project to compile ratings and descriptions of the 500 most powerful publicly known computing systems in the world. The current list of supercomputers is published twice a year (June /November). The project is just celebrating its anniversary (25 years) and, what can not but rejoice, the list was updated in comparison with the previous ones, it included 133 new systems, and the first places are occupied by new favorites.
 
 
10 of the fastest supercomputers in the world. 2018  
 
It seems that they accumulated all the world's digatal power. Meet the 10 fastest supercomputers in the world ...
+ 0 -

The Intel Core i7-8086K (Part 4)

The Intel Core i7-8086K (Part 4) Part 1 Part 2 Part 3 Part 4
 
 

Performance with Overclocking: CPU tests


 
We demonstrated our overclocking results, where we managed to achieve stable operation of the processor at a frequency of 5.1 GHz with a significant increase in voltage. However, working at 5.1 GHz frequency has raised the operating temperature dangerously high, so for our testing we returned back to 5.0 GHz and again performed a series of tests at this increased speed. We also conducted some tests on a standard frequency, but with increased frequencies of DRAM. We launched DRAM in our ASRock system on ...[/h]
+ 0 -

Anti-Piracy Wars - The Empire Strikes Back

+ 0 -

In the search for a successor to KL-7: RACE and AROFLEX

In the search for a successor to KL-7: RACE and AROFLEXAdvanced version of the German encryption machine Enigma KL-7 was developed by the National Security Agency (NSA) in the United States. It was put into operation in 1952 and for many years served as the main cryptographic machine of the US and NATO. The device was code-named ADONIS (high level) and POLLUX (low level), depending on the level of secrecy of the keys. KL-7 remained in service until the 1970s, later some countries operated the KL-7 as a backup device. June 3? 1983 the Canadian Navy sent the last message from the KL-7. The encryption machine was replaced by a number of electronic ...
+ 0 -

Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2

Start here:
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1
 
 
Stearic acid, it turns out, is really an important component of this explosive, and if you use the wrong proportions, it will not work. This test video shows what happens if it is not enough in relation to aluminum - just an explosion and everything has flown apart. This is a complete failure. When the content of stearic acid is correct, it turns out that - the explosion on the video has a directional character and is similar to the launch of a rocket.
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 2 ...
+ 0 -

Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1

Hello, DEFCON! I'm going to break the tradition and this time to begin the performance a minute earlier, because I want to show you so many things that I'm afraid not to be in time. I'm sure that in this presentation there are many more explosive moments than in the whole history of presentations for 25 years of the existence of "Defcon".
 
 
Conference DEFCON 23. How I lost my second eye, or further research in the field of data destruction. Part 1  
 
This is not a solo project, I used many ideas from my friends. This presentation was inspired by the performances of Bruce Potter, who already spoke here, Shane Lawson and Diviant Ollam at the DefCon 19 conference. They told how they launched a data center in which ...
+ 0 -

DEFCON 23. "Recognition of a professional cyber-stalker". Ken Westin

My name is Ken Westin, I'll tell you what it means to be a professional cyberstalker (cyberstalking is the use of the Internet to search for a person, a group of people or an organization) .
 
 
DEFCON 23. "Recognition of a professional cyber-stalker". Ken Westin  
 
I'm the founder of the company GadgetTrak, in which I was a hacker and part-time general manager, and a developer of hardware that allows you to return stolen from people devaysy. I also created a search engine for searching EXIF ​​data in images.
 
Now I do not work for GadgetTrak and currently I am the current senior security analyst at Tripwire Inc., participate in many investigations, collect information ...
+ 0 -