Browse Definitions :
Definition

IBM Power9 Server

IBM Power9 Server is a series of high-end enterprise-level servers and part of the company’s Power Systems line. Power9 is designed to deliver high-performance computing (HPC), speed and bandwidth for heavy workloads.

Power9 applications include in-memory databases, analytics, cloud environments and AI, particularly deep learning and machine learning. Power9 Servers are optimized for popular AI frameworks, including:

  • TensorFlow: Google’s open source software library for numerical computation through data flow graphs
  • Chainer: a neural network framework
  • Caffe: a deep learning framework

While specifics vary among models, Power9 Server features may include:

  • Power9 processor
  • PowerVM, the Power Systems hypervisor, for dynamic scaling of compute resources and memory on demand
  • PCI-Express 4.0
  • OpenCAPI, a high-speed processor standard
  • Chip-level security
  • Lower software and hardware maintenance costs
  • NVLink 2.0, a wire-based communications link by Nvidia, for faster data transport between the CPU and GPU
  • Intelligent storage controllers
  • Regulated power supplies
  • Distributed system clocks that activate if the main system clock fails
This was last updated in October 2018

Continue Reading About IBM Power9 Server

SearchCompliance
  • ISO 31000 Risk Management

    The ISO 31000 Risk Management framework is an international standard that provides businesses with guidelines and principles for ...

  • pure risk

    Pure risk refers to risks that are beyond human control and result in a loss or no loss with no possibility of financial gain.

  • risk reporting

    Risk reporting is a method of identifying risks tied to or potentially impacting an organization's business processes.

SearchSecurity
  • Pretty Good Privacy (PGP)

    Pretty Good Privacy or PGP was a popular program used to encrypt and decrypt email over the internet, as well as authenticate ...

  • email security

    Email security is the process of ensuring the availability, integrity and authenticity of email communications by protecting ...

  • Blowfish

    Blowfish is a variable-length, symmetric, 64-bit block cipher.

SearchHealthIT
SearchDisasterRecovery
  • What is risk mitigation?

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • fault-tolerant

    Fault-tolerant technology is a capability of a computer system, electronic system or network to deliver uninterrupted service, ...

  • synchronous replication

    Synchronous replication is the process of copying data over a storage area network, local area network or wide area network so ...

SearchStorage
  • direct access

    In computer storage, direct access is the process of reading and writing data on a storage device by going directly to where the ...

  • kibi, mebi, gibi, tebi, pebi and exbi

    Kibi, mebi, gibi, tebi, pebi and exbi are binary prefix multipliers that, in 1998, were approved as a standard by the ...

  • holographic storage (holostorage)

    Holographic storage is computer storage that uses laser beams to store computer-generated data in three dimensions.

Close