SlideShare una empresa de Scribd logo
1 de 3
Descargar para leer sin conexión
A 24-hour Storage Data Encryption Rally using
Spitfire StoreSafe Enterprise Storage Security Server
AMD Opteron Dual-Core vs Intel Xeon Hyper-Threading
Why Storage Data Encryption
Advances in Internet, network infrastructure and technologies in the
past decade opened up a new arena in network computing.
Distributed data as a result of network storage, disaster recovery,
backup-restore-archive, Internet and service-oriented architecture
opens up data accessibility at the same time increasing risks of
corporate confidential information exposure to unauthorized parties.
Poor data management, virus-worms-spyware, outsourcing as well
as system consolidation contribute and worsen the situation.
Perimeter security control measures like firewalls and content filters
effectively block intrusions from outsiders, however, statistics have
shown that there is a paradigm shift of attacks to company insiders.
Having private business data lived with human operators whom can
hardly be eliminated, encryption remains the last and only weapon
to combat core intrusions, giving business owners a peaceful of
mind in corporate data security.
Bloombase Spitfire StoreSafe
While existing cryptographic products are mostly piece-meal which
are far from complete solutions, Bloombase develops and markets
Spitfire StoreSafe enterprise-grade storage encryption servers to
bring privacy to corporate data at transparency and efficiency.
Spitfire StoreSafe is a high performance cryptographic engine to act
as a proxy to the protected storage. Spitfire StoreSafe sits half-way
Double the Power
Half the Space
between enterprise application servers and storage network. By writing
data through StoreSafe to the storage network, Spitfire encryption
engine changes plain text data into ciphered data which appear like
garbage. Trusted applications withdrawing data from storage through
StoreSafe get data decrypted automatically. Spitfire StoreSafe acts as
a middleman virtualizing encrypted data storage AS-IF in plain to client
applications and end users.
User Clients
Application
Clients
SAN Switch
Secured Contents
Encrypted Contents
YCKJ6
LJXOR
Hi Bel
This i
Spitfire
StoreSafe
SAN Storage
NAS Filer
NAS Storage
Encrypted Contents
YCKJ6
LJXOR
Secured Contents
Hi Bel
This i
DAS Storage
SCSI
FC
NFS, CIFS
Hosts
Storage
A typical deployment of Spitfire StoreSafe for enterprise storage protection
Spitfire StoreSafe management console
Cryptographic processes are complex mathematical operations which
demand intensive computing resources. Enterprise core systems with
data volume in terabyte order of magnitude need an efficient and
scalable storage security solution to encrypt their data in wire-speed.
Real-time storage cryptography used to be an untouchable subject
due to technical difficulties in numerous areas. As availability of stand
-alone network storage, gigabit communications, efficient and secure
cryptographic block ciphers, low cost yet high-performance computing
infrastructure, as well as the increasing gap between cryptographic
processing and storage speeds, one can afford to introduce encryption
to persistence storage systems without degrading performance in an
unacceptable extent.
This report summarizes the tests done using Spitfire StoreSafe servers
running on AMD Opteron Dual-core and Intel Xeon Hyperthreading
processors to study how high-performance computing can bring real
-time storage encryption to reality and whether multi-core technologies
would benefit the adoption of the technology.
Start the Rally
Spitfire StoreSafe enterprise storage encryption servers are installed
on AMD and Intel rack-optimized server boxes. Both boxes are
Model
Chipset
Processor
Main Memory
Network Interface
Storage
System
Form-factor
AMD
AMD Compute Node Prototype
AMD 8111/8131 chipset
Dual AMD Dual-core Opteron 265 at 1.8GHz/1MB Cache
2GB DDR400
Broadcom BCM5704 Gigabit Ethernet
Seagate 120GB SATA hard-disk
Spitfire StoreSafe for SAN 1.0 on SpitfireOS 1
1U rack-dense
Intel
Dell PowerEdge 2850
Intel E7520 + 82801
Dual Intel Xeon at 3GHz/2MB Cache with Hyperthreading
2GB DDR2
Intel 82541 GI/PI Gigabit Ethernet
Maxtor 36GB SCSI hard-disk ATLAS 12K2_36SCA
Spitfire StoreSafe for SAN 1.0 on SpitfireOS 1
2U rack-dense
Spitfire StoreSafe appliance specifications
installed with dual processors. Intel Xeon's Hyper-Threading is
turned on to establish a level playing field with AMD's dual-core.
Each box has essentially four effective processing units. The
machines are filled with abundant 2GB of main memory and are
loaded the same version of SpitfireOS and Spitfire StoreSafe Core
Cryptographic Engine.
Virtual encrypted disks are created on both machines where AES
cryptographic cipher algorithm with 256-bit long encryption key is
configured to secure the virtual storage. To eliminate the effect of
latency which is caused by input/output (I/O) data access on
physical disk systems, the virtual volumes are implemented by RAM
drives of 1GB capacity such that one can achieve the minimum I/O
latency. A multi-threaded data writer is launched on both systems
which keeps writing random data to the encrypted volumes
concurrently on random separate data blocks within the encrypted
volume, creating encryption workload to Spitfire StoreSafe Core
Cryptographic Engine, loading both AMD Opteron Dual-core and
Intel Xeon HyperThreading processors.
The load creator is made to execute for 24 hours restless on both
systems. The ensemble volume of data encrypted and written to the
encrypted volumes are recorded. System resources are closely
monitored during the rally to ensure they run at abundant amount of
resources. Spitfire StoreSafe SNMP alerts are also monitored to
observe if runtime exceptions are produced during the rally.
The Results
The tests were carried out successfully without errors found in syslog
nor Spitfire StoreSafe. Majority of time both servers were running with
full speed at more than 80% CPU utilization. Spitfire StoreSafe servers
ran with memory consumption never exceeding 128MB over the entire
rally.
6.36 TB
AMD Opteron Dual-Core
Intel Xeon with Hyper-Threading
Volume of data encrypted in 24 hours (Longer bar indicates better
performance)
15.28 TB
Within 24 hours, AMD-based Spitfire StoreSafe encrypted
a total of 17.28TB data whereas Intel-based Spitfire
StoreSafe encrypted 6.36TB. Spitfire StoreSafe running
on AMD Opteron Dual-Core system is capable of
encrypting more than double (2.4025 to 1) amount of those
processed by Intel Xeon's. Spitfire StoreSafe easily
attained an average 1.4148Gbps cryptographic throughput
without creating bottleneck in nowadays storage network
which operates at 1G-2G speed.
The Winner
Both servers have identical amount of memory and same
configuration of Spitfire StoreSafe. They both have 4
effective processing units. AMD achieves 4-way processing
by two physical dual-core Opteron chip. Intel box achieves
the same by two Xeon chips with HyperThreading
capability. Nevertheless, the 1U space saving AMD box
brings encryption to gigabit speed that the 2U Intel box can
hardly attained.
The result shows AMD's Opteron dual-core technology
excels Intel Xeon's HyperThreading by more than 140% and
is obviously the performance winner.
Bloombase Technologies - Least Invasive Security email info@bloombase.com web bloombase.com
All rights reserved. 2005 Bloombase Technologies.
Spitfire, Spitfire SOA, Spitfire Messaging, Spitfire StoreSafe, Spitfire StoreSafe Lite, Spitfire KeyCastle, SpitfireOS are trademarks
of Bloombase Technologies Ltd. Specifications are subject to change without notice.
All other trademarks are the property of their respective owners.
Tests in this report are carried out with support and sponsor of Advanced Micro Device Inc.
About AMD Opteron Multi-Core Processors
Multi-Core Processors - The Next Generation In Computing
Multi-core processors represent a major evolution in computing technology.
This important development is coming at a time when businesses and
consumers are beginning to require the benefits offered by these processors
due to the exponential growth of digital data and the globalization of the
Internet. Multi-core processors will eventually become the pervasive
computing model because they offer performance and productivity benefits
beyond the capabilities of today's single-core processors.
Multi-core processors exemplify AMD's vision to understand customers and
deliver products that best meet their needs. AMD has been planning for this
important evolution since the late 1990s when it first announced a strategy
to place multiple cores on a single processor. Since AMD's multi-core
processors will use the same straightforward and proven architecture
available in single-core AMD64 processors, the company's multi-core
processors will magnify the elegance of this design and offer the exceptional
overall performance that AMD's customers expect.
AMD's enterprise customers can deploy new server blade systems without
having to increase the physical footprint of their computer system resources,
plan for additional heat dissipation, or provide additional power. Multi-core
processor-based servers will deliver more overall performance than those
powered by single-core processors, while at the same time will be easier to
manage because more processing capacity can be concentrated into fewer
servers. For the same reason, multi-core servers will be less costly to
operate.
The AMD64 Multi-Core Advantage
< Ease of Migration to Multi-Core Processors
< OEMs and system builders can easily incorporate multi-core products into
their existing AMD Opteron™ processor-based and AMD Athlon™ 64
processor-based designs
< Socket infrastructure compatible with existing 90nm single-core processor
architectures (Contact your solution provider to guarantee system
readiness.)
< Higher Performance Per Watt
< Customers can experience the performance advantages of multi-core
processors by getting the best performance per watt available in the market
< Direct Connect Architecture
< For servers and workstations, the best 2-way and 4-way architecture for x86
computing
< Addresses and helps reduce the real challenges and bottlenecks of system
architecture because everything is directly connected to the CPU
< Directly connects the processor cores to a single die to even further reduce
latencies between processors
Dual-Core Processor Overview
< AMD64 processors were designed from the start to add a second core
< Port already existed on crossbar/SRI
< One die with 2 CPU cores, each core has its own 1MB L2 cache
< Drops into existing AMD Opteron processor 940-pin sockets and AMD Athlon
64 Dual-Core processor 939-pin sockets that are compatible with 90nm single
-core processor architectures
< A BIOS update is all that is necessary to get a compatible system up and
running with dual-core processors
< The 2 CPU cores leverage the same memory and HyperTransport™
technology resources available in single-core processors.
For more details please visit us at http://multicore.amd.com/en/

Más contenido relacionado

La actualidad más candente

Nimbus Partner Solutions Brief
Nimbus Partner Solutions BriefNimbus Partner Solutions Brief
Nimbus Partner Solutions BriefIT Brand Pulse
 
Eonstor GSc family introduction
Eonstor GSc family introductionEonstor GSc family introduction
Eonstor GSc family introductioninfortrendgroup
 
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStack
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStackJetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStack
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStackGene Leyzarovich
 
2018 Infortrend All Flash Arrays Introduction (GS3025A)
2018 Infortrend All Flash Arrays Introduction (GS3025A)2018 Infortrend All Flash Arrays Introduction (GS3025A)
2018 Infortrend All Flash Arrays Introduction (GS3025A)infortrendgroup
 
JetStor 780JH JBOD 4U 640TB
JetStor 780JH JBOD 4U 640TBJetStor 780JH JBOD 4U 640TB
JetStor 780JH JBOD 4U 640TBGene Leyzarovich
 
2018 Infortrend EonStor GSe Pro Family Introduction
2018 Infortrend EonStor GSe Pro Family Introduction2018 Infortrend EonStor GSe Pro Family Introduction
2018 Infortrend EonStor GSe Pro Family Introductioninfortrendgroup
 
Nexsan products overview / Nexsan perspectiva de productos
Nexsan products overview / Nexsan perspectiva de productosNexsan products overview / Nexsan perspectiva de productos
Nexsan products overview / Nexsan perspectiva de productosSuministros Obras y Sistemas
 
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesPCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesOdinot Stanislas
 
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage Comparison
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage ComparisonIntel and DataStax: 3D XPoint and NVME Technology Cassandra Storage Comparison
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage ComparisonDataStax Academy
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0 TTEC
 
Intel ssd dc data center family for PCIe
Intel ssd dc data center family for PCIeIntel ssd dc data center family for PCIe
Intel ssd dc data center family for PCIeLow Hong Chuan
 
Filename intelvmwaresolutionbrief asset4
Filename intelvmwaresolutionbrief asset4Filename intelvmwaresolutionbrief asset4
Filename intelvmwaresolutionbrief asset4ReadWrite
 
For Embedded boot load application
For Embedded boot load applicationFor Embedded boot load application
For Embedded boot load applicationSilicon Motion
 

La actualidad más candente (20)

Nimbus Partner Solutions Brief
Nimbus Partner Solutions BriefNimbus Partner Solutions Brief
Nimbus Partner Solutions Brief
 
Eonstor GSc family introduction
Eonstor GSc family introductionEonstor GSc family introduction
Eonstor GSc family introduction
 
The Benefits of using Tegile
The Benefits of using TegileThe Benefits of using Tegile
The Benefits of using Tegile
 
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStack
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStackJetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStack
JetStor 780JH 80bay JBOD ZFS Hadoop XFS OpenStack
 
2018 Infortrend All Flash Arrays Introduction (GS3025A)
2018 Infortrend All Flash Arrays Introduction (GS3025A)2018 Infortrend All Flash Arrays Introduction (GS3025A)
2018 Infortrend All Flash Arrays Introduction (GS3025A)
 
Huawei - All-Flash Innovation
Huawei - All-Flash InnovationHuawei - All-Flash Innovation
Huawei - All-Flash Innovation
 
Huawei’s All-Flash Innovation
Huawei’s All-Flash InnovationHuawei’s All-Flash Innovation
Huawei’s All-Flash Innovation
 
JetStor 780JH JBOD 4U 640TB
JetStor 780JH JBOD 4U 640TBJetStor 780JH JBOD 4U 640TB
JetStor 780JH JBOD 4U 640TB
 
Raid technology
Raid technologyRaid technology
Raid technology
 
2018 Infortrend EonStor GSe Pro Family Introduction
2018 Infortrend EonStor GSe Pro Family Introduction2018 Infortrend EonStor GSe Pro Family Introduction
2018 Infortrend EonStor GSe Pro Family Introduction
 
Nexsan products overview / Nexsan perspectiva de productos
Nexsan products overview / Nexsan perspectiva de productosNexsan products overview / Nexsan perspectiva de productos
Nexsan products overview / Nexsan perspectiva de productos
 
TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06TP564_DriveTrust_Oct06
TP564_DriveTrust_Oct06
 
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform TopologiesPCI Express* based Storage: Data Center NVM Express* Platform Topologies
PCI Express* based Storage: Data Center NVM Express* Platform Topologies
 
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage Comparison
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage ComparisonIntel and DataStax: 3D XPoint and NVME Technology Cassandra Storage Comparison
Intel and DataStax: 3D XPoint and NVME Technology Cassandra Storage Comparison
 
Software defined storage rev. 2.0
Software defined storage rev. 2.0 Software defined storage rev. 2.0
Software defined storage rev. 2.0
 
Ibm ds8880 product guide redp5344
Ibm ds8880 product guide redp5344Ibm ds8880 product guide redp5344
Ibm ds8880 product guide redp5344
 
Intel ssd dc data center family for PCIe
Intel ssd dc data center family for PCIeIntel ssd dc data center family for PCIe
Intel ssd dc data center family for PCIe
 
Filename intelvmwaresolutionbrief asset4
Filename intelvmwaresolutionbrief asset4Filename intelvmwaresolutionbrief asset4
Filename intelvmwaresolutionbrief asset4
 
For Embedded boot load application
For Embedded boot load applicationFor Embedded boot load application
For Embedded boot load application
 
Unisys Stealth Black
Unisys Stealth BlackUnisys Stealth Black
Unisys Stealth Black
 

Similar a Blbs tn-double-the-power-half-the-space-uslet-en

Virtual Private Server Documentation
Virtual Private Server DocumentationVirtual Private Server Documentation
Virtual Private Server Documentationwebhostingguy
 
Virtual Private Server Documentation
Virtual Private Server DocumentationVirtual Private Server Documentation
Virtual Private Server Documentationwebhostingguy
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIORebekah Rodriguez
 
Fujitsu World Tour 2017 - Compute Platform For The Digital World
Fujitsu World Tour 2017 - Compute Platform For The Digital WorldFujitsu World Tour 2017 - Compute Platform For The Digital World
Fujitsu World Tour 2017 - Compute Platform For The Digital WorldFujitsu India
 
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 TechnologyAdd Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 TechnologyIBM India Smarter Computing
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Netgear Italia
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)Scott Eiser
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale finalJoe Krotz
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v finalCisco Canada
 
OpenPOWER/POWER9 Webinar from MIT and IBM
OpenPOWER/POWER9 Webinar from MIT and IBM OpenPOWER/POWER9 Webinar from MIT and IBM
OpenPOWER/POWER9 Webinar from MIT and IBM Ganesan Narayanasamy
 
High-Density Top-Loading Storage for Cloud Scale Applications
High-Density Top-Loading Storage for Cloud Scale Applications High-Density Top-Loading Storage for Cloud Scale Applications
High-Density Top-Loading Storage for Cloud Scale Applications Rebekah Rodriguez
 
3PAR and VMWare
3PAR and VMWare3PAR and VMWare
3PAR and VMWarevmug
 
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based Hardware
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based HardwareRed hat Storage Day LA - Designing Ceph Clusters Using Intel-Based Hardware
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based HardwareRed_Hat_Storage
 
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors Rebekah Rodriguez
 
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex system
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex systemIbm symp14 referent_marcus alexander mac dougall_ibm x6 und flex system
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex systemIBM Switzerland
 

Similar a Blbs tn-double-the-power-half-the-space-uslet-en (20)

Virtual Private Server Documentation
Virtual Private Server DocumentationVirtual Private Server Documentation
Virtual Private Server Documentation
 
Virtual Private Server Documentation
Virtual Private Server DocumentationVirtual Private Server Documentation
Virtual Private Server Documentation
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 
Fujitsu World Tour 2017 - Compute Platform For The Digital World
Fujitsu World Tour 2017 - Compute Platform For The Digital WorldFujitsu World Tour 2017 - Compute Platform For The Digital World
Fujitsu World Tour 2017 - Compute Platform For The Digital World
 
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 TechnologyAdd Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
Add Memory, Improve Performance, and Lower Costs with IBM MAX5 Technology
 
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
Webinar NETGEAR - Acronis e Netgear le Best Practices per la protezione di si...
 
OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)OpenDrives_-_Product_Sheet_v13D (2) (1)
OpenDrives_-_Product_Sheet_v13D (2) (1)
 
Spectrum Scale final
Spectrum Scale finalSpectrum Scale final
Spectrum Scale final
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
OpenPOWER/POWER9 Webinar from MIT and IBM
OpenPOWER/POWER9 Webinar from MIT and IBM OpenPOWER/POWER9 Webinar from MIT and IBM
OpenPOWER/POWER9 Webinar from MIT and IBM
 
High-Density Top-Loading Storage for Cloud Scale Applications
High-Density Top-Loading Storage for Cloud Scale Applications High-Density Top-Loading Storage for Cloud Scale Applications
High-Density Top-Loading Storage for Cloud Scale Applications
 
3PAR and VMWare
3PAR and VMWare3PAR and VMWare
3PAR and VMWare
 
Supercharge Your Storage
Supercharge Your StorageSupercharge Your Storage
Supercharge Your Storage
 
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based Hardware
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based HardwareRed hat Storage Day LA - Designing Ceph Clusters Using Intel-Based Hardware
Red hat Storage Day LA - Designing Ceph Clusters Using Intel-Based Hardware
 
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors
X13 Pre-Release Update featuring 4th Gen Intel® Xeon® Scalable Processors
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex system
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex systemIbm symp14 referent_marcus alexander mac dougall_ibm x6 und flex system
Ibm symp14 referent_marcus alexander mac dougall_ibm x6 und flex system
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 

Más de Bloombase

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdfBloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...Bloombase
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusBloombase
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625Bloombase
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizationsBloombase
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentBloombase
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplaceBloombase
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...Bloombase
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12Bloombase
 
Eskm &amp; bloombase integration data security oct 16
Eskm &amp; bloombase integration   data security oct 16Eskm &amp; bloombase integration   data security oct 16
Eskm &amp; bloombase integration data security oct 16Bloombase
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enwBloombase
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdfBloombase
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017Bloombase
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryptionBloombase
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Bloombase
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Bloombase
 

Más de Bloombase (20)

a50009291enw - Letter.pdf
a50009291enw - Letter.pdfa50009291enw - Letter.pdf
a50009291enw - Letter.pdf
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
HPE and Bloombase – HPE ProLiant and Bloombase StoreSafe Intelligent Storage ...
 
Post-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and MorpheusPost-Quantum Security with NVIDIA DPUs and Morpheus
Post-Quantum Security with NVIDIA DPUs and Morpheus
 
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
HPE - Additional license authorizations - Ala atalla sep2016_5200-0625
 
HPE - Additional license authorizations
HPE - Additional license authorizationsHPE - Additional license authorizations
HPE - Additional license authorizations
 
HPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop EnvironmentHPE - Enable Productivity and Security In Your NonStop Environment
HPE - Enable Productivity and Security In Your NonStop Environment
 
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
Delivering transparent data_encryption_while_centrally_managing_keys_eskm-blo...
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe bloombase, inc. - oracle cloud marketplace
Bloombase store safe   bloombase, inc. - oracle cloud marketplaceBloombase store safe   bloombase, inc. - oracle cloud marketplace
Bloombase store safe bloombase, inc. - oracle cloud marketplace
 
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...Hpe bloombase store safe kmip integration   license - 1 cpu core - with hpe -...
Hpe bloombase store safe kmip integration license - 1 cpu core - with hpe -...
 
The connection forweb p12
The connection forweb p12The connection forweb p12
The connection forweb p12
 
Eskm &amp; bloombase integration data security oct 16
Eskm &amp; bloombase integration   data security oct 16Eskm &amp; bloombase integration   data security oct 16
Eskm &amp; bloombase integration data security oct 16
 
Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15Bloombase integration with eskm final w alliance cert logo 6_11_15
Bloombase integration with eskm final w alliance cert logo 6_11_15
 
4 aa6 8278enw
4 aa6 8278enw4 aa6 8278enw
4 aa6 8278enw
 
Bloombase store safe mf solution brief 2017 pdf
Bloombase store safe   mf solution brief 2017 pdfBloombase store safe   mf solution brief 2017 pdf
Bloombase store safe mf solution brief 2017 pdf
 
Bloombase store safe 1pager mf solution brief template 2017
Bloombase store safe   1pager mf solution brief template 2017Bloombase store safe   1pager mf solution brief template 2017
Bloombase store safe 1pager mf solution brief template 2017
 
The connection beyond non stop encryption
The connection   beyond non stop encryptionThe connection   beyond non stop encryption
The connection beyond non stop encryption
 
Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2Win av as_pm_de_3_6_11098_2
Win av as_pm_de_3_6_11098_2
 
Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2Win av as_pm_de_3_6_10363_2
Win av as_pm_de_3_6_10363_2
 

Último

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Último (20)

What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

Blbs tn-double-the-power-half-the-space-uslet-en

  • 1. A 24-hour Storage Data Encryption Rally using Spitfire StoreSafe Enterprise Storage Security Server AMD Opteron Dual-Core vs Intel Xeon Hyper-Threading Why Storage Data Encryption Advances in Internet, network infrastructure and technologies in the past decade opened up a new arena in network computing. Distributed data as a result of network storage, disaster recovery, backup-restore-archive, Internet and service-oriented architecture opens up data accessibility at the same time increasing risks of corporate confidential information exposure to unauthorized parties. Poor data management, virus-worms-spyware, outsourcing as well as system consolidation contribute and worsen the situation. Perimeter security control measures like firewalls and content filters effectively block intrusions from outsiders, however, statistics have shown that there is a paradigm shift of attacks to company insiders. Having private business data lived with human operators whom can hardly be eliminated, encryption remains the last and only weapon to combat core intrusions, giving business owners a peaceful of mind in corporate data security. Bloombase Spitfire StoreSafe While existing cryptographic products are mostly piece-meal which are far from complete solutions, Bloombase develops and markets Spitfire StoreSafe enterprise-grade storage encryption servers to bring privacy to corporate data at transparency and efficiency. Spitfire StoreSafe is a high performance cryptographic engine to act as a proxy to the protected storage. Spitfire StoreSafe sits half-way Double the Power Half the Space between enterprise application servers and storage network. By writing data through StoreSafe to the storage network, Spitfire encryption engine changes plain text data into ciphered data which appear like garbage. Trusted applications withdrawing data from storage through StoreSafe get data decrypted automatically. Spitfire StoreSafe acts as a middleman virtualizing encrypted data storage AS-IF in plain to client applications and end users. User Clients Application Clients SAN Switch Secured Contents Encrypted Contents YCKJ6 LJXOR Hi Bel This i Spitfire StoreSafe SAN Storage NAS Filer NAS Storage Encrypted Contents YCKJ6 LJXOR Secured Contents Hi Bel This i DAS Storage SCSI FC NFS, CIFS Hosts Storage A typical deployment of Spitfire StoreSafe for enterprise storage protection
  • 2. Spitfire StoreSafe management console Cryptographic processes are complex mathematical operations which demand intensive computing resources. Enterprise core systems with data volume in terabyte order of magnitude need an efficient and scalable storage security solution to encrypt their data in wire-speed. Real-time storage cryptography used to be an untouchable subject due to technical difficulties in numerous areas. As availability of stand -alone network storage, gigabit communications, efficient and secure cryptographic block ciphers, low cost yet high-performance computing infrastructure, as well as the increasing gap between cryptographic processing and storage speeds, one can afford to introduce encryption to persistence storage systems without degrading performance in an unacceptable extent. This report summarizes the tests done using Spitfire StoreSafe servers running on AMD Opteron Dual-core and Intel Xeon Hyperthreading processors to study how high-performance computing can bring real -time storage encryption to reality and whether multi-core technologies would benefit the adoption of the technology. Start the Rally Spitfire StoreSafe enterprise storage encryption servers are installed on AMD and Intel rack-optimized server boxes. Both boxes are Model Chipset Processor Main Memory Network Interface Storage System Form-factor AMD AMD Compute Node Prototype AMD 8111/8131 chipset Dual AMD Dual-core Opteron 265 at 1.8GHz/1MB Cache 2GB DDR400 Broadcom BCM5704 Gigabit Ethernet Seagate 120GB SATA hard-disk Spitfire StoreSafe for SAN 1.0 on SpitfireOS 1 1U rack-dense Intel Dell PowerEdge 2850 Intel E7520 + 82801 Dual Intel Xeon at 3GHz/2MB Cache with Hyperthreading 2GB DDR2 Intel 82541 GI/PI Gigabit Ethernet Maxtor 36GB SCSI hard-disk ATLAS 12K2_36SCA Spitfire StoreSafe for SAN 1.0 on SpitfireOS 1 2U rack-dense Spitfire StoreSafe appliance specifications installed with dual processors. Intel Xeon's Hyper-Threading is turned on to establish a level playing field with AMD's dual-core. Each box has essentially four effective processing units. The machines are filled with abundant 2GB of main memory and are loaded the same version of SpitfireOS and Spitfire StoreSafe Core Cryptographic Engine. Virtual encrypted disks are created on both machines where AES cryptographic cipher algorithm with 256-bit long encryption key is configured to secure the virtual storage. To eliminate the effect of latency which is caused by input/output (I/O) data access on physical disk systems, the virtual volumes are implemented by RAM drives of 1GB capacity such that one can achieve the minimum I/O latency. A multi-threaded data writer is launched on both systems which keeps writing random data to the encrypted volumes concurrently on random separate data blocks within the encrypted volume, creating encryption workload to Spitfire StoreSafe Core Cryptographic Engine, loading both AMD Opteron Dual-core and Intel Xeon HyperThreading processors. The load creator is made to execute for 24 hours restless on both systems. The ensemble volume of data encrypted and written to the encrypted volumes are recorded. System resources are closely monitored during the rally to ensure they run at abundant amount of resources. Spitfire StoreSafe SNMP alerts are also monitored to observe if runtime exceptions are produced during the rally. The Results The tests were carried out successfully without errors found in syslog nor Spitfire StoreSafe. Majority of time both servers were running with full speed at more than 80% CPU utilization. Spitfire StoreSafe servers ran with memory consumption never exceeding 128MB over the entire rally. 6.36 TB AMD Opteron Dual-Core Intel Xeon with Hyper-Threading Volume of data encrypted in 24 hours (Longer bar indicates better performance) 15.28 TB
  • 3. Within 24 hours, AMD-based Spitfire StoreSafe encrypted a total of 17.28TB data whereas Intel-based Spitfire StoreSafe encrypted 6.36TB. Spitfire StoreSafe running on AMD Opteron Dual-Core system is capable of encrypting more than double (2.4025 to 1) amount of those processed by Intel Xeon's. Spitfire StoreSafe easily attained an average 1.4148Gbps cryptographic throughput without creating bottleneck in nowadays storage network which operates at 1G-2G speed. The Winner Both servers have identical amount of memory and same configuration of Spitfire StoreSafe. They both have 4 effective processing units. AMD achieves 4-way processing by two physical dual-core Opteron chip. Intel box achieves the same by two Xeon chips with HyperThreading capability. Nevertheless, the 1U space saving AMD box brings encryption to gigabit speed that the 2U Intel box can hardly attained. The result shows AMD's Opteron dual-core technology excels Intel Xeon's HyperThreading by more than 140% and is obviously the performance winner. Bloombase Technologies - Least Invasive Security email info@bloombase.com web bloombase.com All rights reserved. 2005 Bloombase Technologies. Spitfire, Spitfire SOA, Spitfire Messaging, Spitfire StoreSafe, Spitfire StoreSafe Lite, Spitfire KeyCastle, SpitfireOS are trademarks of Bloombase Technologies Ltd. Specifications are subject to change without notice. All other trademarks are the property of their respective owners. Tests in this report are carried out with support and sponsor of Advanced Micro Device Inc. About AMD Opteron Multi-Core Processors Multi-Core Processors - The Next Generation In Computing Multi-core processors represent a major evolution in computing technology. This important development is coming at a time when businesses and consumers are beginning to require the benefits offered by these processors due to the exponential growth of digital data and the globalization of the Internet. Multi-core processors will eventually become the pervasive computing model because they offer performance and productivity benefits beyond the capabilities of today's single-core processors. Multi-core processors exemplify AMD's vision to understand customers and deliver products that best meet their needs. AMD has been planning for this important evolution since the late 1990s when it first announced a strategy to place multiple cores on a single processor. Since AMD's multi-core processors will use the same straightforward and proven architecture available in single-core AMD64 processors, the company's multi-core processors will magnify the elegance of this design and offer the exceptional overall performance that AMD's customers expect. AMD's enterprise customers can deploy new server blade systems without having to increase the physical footprint of their computer system resources, plan for additional heat dissipation, or provide additional power. Multi-core processor-based servers will deliver more overall performance than those powered by single-core processors, while at the same time will be easier to manage because more processing capacity can be concentrated into fewer servers. For the same reason, multi-core servers will be less costly to operate. The AMD64 Multi-Core Advantage < Ease of Migration to Multi-Core Processors < OEMs and system builders can easily incorporate multi-core products into their existing AMD Opteron™ processor-based and AMD Athlon™ 64 processor-based designs < Socket infrastructure compatible with existing 90nm single-core processor architectures (Contact your solution provider to guarantee system readiness.) < Higher Performance Per Watt < Customers can experience the performance advantages of multi-core processors by getting the best performance per watt available in the market < Direct Connect Architecture < For servers and workstations, the best 2-way and 4-way architecture for x86 computing < Addresses and helps reduce the real challenges and bottlenecks of system architecture because everything is directly connected to the CPU < Directly connects the processor cores to a single die to even further reduce latencies between processors Dual-Core Processor Overview < AMD64 processors were designed from the start to add a second core < Port already existed on crossbar/SRI < One die with 2 CPU cores, each core has its own 1MB L2 cache < Drops into existing AMD Opteron processor 940-pin sockets and AMD Athlon 64 Dual-Core processor 939-pin sockets that are compatible with 90nm single -core processor architectures < A BIOS update is all that is necessary to get a compatible system up and running with dual-core processors < The 2 CPU cores leverage the same memory and HyperTransport™ technology resources available in single-core processors. For more details please visit us at http://multicore.amd.com/en/