Welcome!

Open Source Cloud Authors: Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan, Yeshim Deniz

News Feed Item

HyperCloud Memory Helps Break the 1 Million Transaction per Minute Barrier in Virtualized x86-64 Benchmark Performance

Breakthrough TPC-C Results With 768GB of HyperCloud

IRVINE, CA -- (Marketwire) -- 02/28/13 -- Netlist, Inc. (NASDAQ: NLST), a leading provider of high performance memory solutions for the cloud computing market, announced that its 32GB HyperCloud HCDIMM memory was an integral part of a system which broke the one million transaction per minute barrier in TPC Benchmark C testing.

Along with the latest server hardware technologies and Linux software running Hypervisor on an x86 platform, 768GB of HyperCloud memory enabled a server system for the first time to surpass the one million transaction per minute barrier in a virtualized x86 platform.

"The Transaction Processing Council is one of the most respected benchmarking organizations in the server and supercomputing industry. We're very pleased to have HyperCloud memory be part of a record-setting performance as measured and recorded by TPC-C," said C.K. Hong, CEO of Netlist.

The TPC-C benchmark results can be accessed via our blog: http://www.netlist.com/media/blog/breakthrough-tpc-c-results-with-768gb-of-hypercloud/

HyperCloud memory utilizes a distributed buffer architecture to reduce latency and incorporates Netlist's patented rank multiplication and load reduction technologies. Rank multiplication enables more DRAM capacity and load reduction reduces the loading to the memory interface allowing HCDIMMs to run at faster speeds at maximum capacity.

HCDIMMs allow servers to operate at their peak potential by speeding up the transfer of data between CPU and memory. HyperCloud increases performance in such key applications as analytics, simulation and as shown by this benchmark, virtualization.

Additional information on Netlist's HyperCloud technology can be found at www.netlist.com/hypercloud.

About Netlist:

Netlist, Inc. designs and manufactures high-performance, logic-based memory subsystems for server and storage applications for cloud computing. Netlist's flagship products include HyperCloud™, a patented memory technology that breaks traditional memory barriers, NVvault™ family of products that enables data retention during power interruption, EXPRESSvault™, a PCI Express backup/recovery solution for cache data protection and a broad portfolio of industrial Flash and specialty memory subsystems including VLP (very low profile) DIMMs and Planar-X RDIMMs.

Netlist develops technology solutions for customer applications in which high-speed, high-capacity, small form factor and heat dissipation are key requirements for system memory. These customers include OEMs that design and build tower, rack-mounted, and blade servers, high-performance computing clusters, engineering workstations and telecommunications equipment. Founded in 2000, Netlist is headquartered in Irvine, CA with manufacturing facilities in Suzhou, People's Republic of China and an engineering design center in Silicon Valley, CA. Learn more at www.netlist.com.

Safe Harbor Statement:

This news release contains forward-looking statements regarding future events and the future performance of Netlist. These forward-looking statements involve risks and uncertainties that could cause actual results to differ materially from those expected or projected. These risks and uncertainties include, but are not limited to, risks associated with the launch and commercial success of our products, programs and technologies; the success of product partnerships; continuing development, qualification and volume production of EXPRESSvault™, NVvault™, HyperCloud™ and VLP Planar-X RDIMM; the rapidly-changing nature of technology; risks associated with intellectual property, including the costs and unpredictability of litigation over infringement of our intellectual property and the possibility of the Company's patents being re-examined by the United States Patent and Trademark office; volatility in the pricing of DRAM ICs and NAND; changes in and uncertainty of customer acceptance of, and demand for, our existing products and products under development, including uncertainty of and/or delays in product orders and product qualifications; delays in the Company's and its customers' product releases and development; introductions of new products by competitors; changes in end-user demand for technology solutions; the Company's ability to attract and retain skilled personnel; the Company's reliance on suppliers of critical components and vendors in the supply chain; fluctuations in the market price of critical components; evolving industry standards; and the political and regulatory environment in the People's Republic of China. Other risks and uncertainties are described in the Company's annual report on Form 10-K filed on February 28, 2012, and subsequent filings with the U.S. Securities and Exchange Commission made by the Company from time to time. Except as required by law, Netlist undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

For more information, please contact:

Brainerd Communicators, Inc.
Mike Smargiassi (investors)
Sharon Oh (media)
[email protected]
(212) 986-6667

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

IoT & Smart Cities Stories
While the focus and objectives of IoT initiatives are many and diverse, they all share a few common attributes, and one of those is the network. Commonly, that network includes the Internet, over which there isn't any real control for performance and availability. Or is there? The current state of the art for Big Data analytics, as applied to network telemetry, offers new opportunities for improving and assuring operational integrity. In his session at @ThingsExpo, Jim Frey, Vice President of S...
@CloudEXPO and @ExpoDX, two of the most influential technology events in the world, have hosted hundreds of sponsors and exhibitors since our launch 10 years ago. @CloudEXPO and @ExpoDX New York and Silicon Valley provide a full year of face-to-face marketing opportunities for your company. Each sponsorship and exhibit package comes with pre and post-show marketing programs. By sponsoring and exhibiting in New York and Silicon Valley, you reach a full complement of decision makers and buyers in ...
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound e...
Two weeks ago (November 3-5), I attended the Cloud Expo Silicon Valley as a speaker, where I presented on the security and privacy due diligence requirements for cloud solutions. Cloud security is a topical issue for every CIO, CISO, and technology buyer. Decision-makers are always looking for insights on how to mitigate the security risks of implementing and using cloud solutions. Based on the presentation topics covered at the conference, as well as the general discussions heard between sessio...
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, compared the Jevons Paradox to modern-day enterprise IT, examin...
Rodrigo Coutinho is part of OutSystems' founders' team and currently the Head of Product Design. He provides a cross-functional role where he supports Product Management in defining the positioning and direction of the Agile Platform, while at the same time promoting model-based development and new techniques to deliver applications in the cloud.
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
There are many examples of disruption in consumer space – Uber disrupting the cab industry, Airbnb disrupting the hospitality industry and so on; but have you wondered who is disrupting support and operations? AISERA helps make businesses and customers successful by offering consumer-like user experience for support and operations. We have built the world’s first AI-driven IT / HR / Cloud / Customer Support and Operations solution.
LogRocket helps product teams develop better experiences for users by recording videos of user sessions with logs and network data. It identifies UX problems and reveals the root cause of every bug. LogRocket presents impactful errors on a website, and how to reproduce it. With LogRocket, users can replay problems.
Data Theorem is a leading provider of modern application security. Its core mission is to analyze and secure any modern application anytime, anywhere. The Data Theorem Analyzer Engine continuously scans APIs and mobile applications in search of security flaws and data privacy gaps. Data Theorem products help organizations build safer applications that maximize data security and brand protection. The company has detected more than 300 million application eavesdropping incidents and currently secu...