ScTech-Dev

Our Products and Services

Offshore Software Outsourcing

We provides world-class software outsourcing services, specializing in Offshore IT Outsourcing services and Business Process Outsourcing services to global clients.

Custom Software Development

Our Vietnam software development engineers have many years of experience in developing different types of systems, from website development, application development for small and medium enterprises, IT solutions for enterprises to large-scaled e-government systems using various IT technologies.

Beowulf

Beowulf Cluster

Beowulf is a multi-computer architecture which can be used for parallel computations. It is a system which usually consists of one server node, and one or more client nodes connected together via Ethernet or some other network. It is a system built using commodity hardware components, like any PC capable of running a Unix-like operating system, with standard Ethernet adapters, and switches. It does not contain any custom hardware components and is trivially reproducible. Beowulf also uses commodity software like the Linux or Solaris operating system, Parallel Virtual Machine (PVM) and Message Passing Interface (MPI). The server node controls the whole cluster and serves files to the client nodes. It is also the cluster's console and gateway to the outside world. Large Beowulf machines might have more than one server node, and possibly other nodes dedicated to particular tasks, for example consoles or monitoring stations. In most cases client nodes in a Beowulf system are dumb, the dumber the better. Nodes are configured and controlled by the server node, and do only what they are told to do. In a disk-less client configuration, client nodes don't even know their IP address or name until the server tells them what it is.
 
The typical setup of a beowulf cluster
One of the main differences between Beowulf and a Cluster of Workstations (COW) is that Beowulf behaves more like a single machine rather than many workstations. In most cases client nodes do not have keyboards or monitors, and are accessed only via remote login or possibly serial terminal. Beowulf nodes can be thought of as a CPU + memory package which can be plugged in to the cluster, just like a CPU or memory module can be plugged into a motherboard.
Beowulf is not a special software package, new network topology or the latest kernel hack. Beowulf is a technology of clustering computers to form a parallel, virtual supercomputer. Although there are many software packages such as kernel modifications, PVM and MPI libraries, and configuration tools which make the Beowulf architecture faster, easier to configure, and much more usable, one can build a Beowulf class machine using standard Linux distribution without any additional software. If you have two networked computers which share at least the /home file system via NFS, and trust each other to execute remote shells (rsh), then it could be argued that you have a simple, two node Beowulf machine.

Network

Network service

Network services are configured on corporate LAN’s to ensure security and user friendly operation. They help the LAN run smoothly and efficiently. Corporate LANs use network services such as DNS (Domain Name System) to give names to IP and MAC addresses (people remember names like “nm.lan” better than they remember numbers like “210.121.67.18”), and DHCP to ensure that everyone on the network has a valid IP address.

DHCP eases administrative burden by automating the IP assignment of nodes on the network. Adding or removing nodes from the network doesn’t create problems with IP address retrieval; the DHCP service handles this automatically. Authentication servers are another network service, they allow every user to have their own account, and everything they do on that account is logged under their user name. This means that not only are users accountable for anything they do while on the network, but also it increases security as anyone wanting to access the LAN must have a registered user name and password.

Doing network administration without having user accounts to track user activity (illegal or otherwise) or DHCP to automate IP assignment to nodes, or DNS to simplify IP address access would be troublesome indeed. Enabling these few network services automates complex and time consuming administration to the network, and thus eases downtime for network administrators.

Email, printing and network file sharing services are also network services. They are seldom not used in a LAN environment, as they allow users to access any printer connected to the network, files on the server or other nodes connected, and streamline data transfer within the network. They require users to have permissions to access the resources shared, and are simple to configure security and access rights for, with the directory service- also a network service.

Common network services include:

  • Authentication servers
  • Directory services
  • Dynamic Host Configuration Protocol (DHCP)
  • DNS
  • e-Mail
  • Printing
  • Network file system

Computational

Computational science

The field is distinct from computer science (the mathematical study of computation, computers and information processing). It is also different from theory and experiment which are the traditional forms of science and engineering. The scientific computing approach is to gain understanding, mainly through the analysis of mathematical models implemented on computers.

Scientists and engineers develop computer programs, application software, that model systems being studied and run these programs with various sets of input parameters. Typically, these models require massive amounts of calculations (usually floating-point) and are often executed on supercomputers or distributed computing platforms.

Numerical analysis is an important underpinning for techniques used in computational science.

Problem domains for computational science/scientific computing include:

Numerical simulations

Numerical simulations have different objectives depending on the nature of the task being simulated:
Reconstruct and understand known events (e.g., earthquake, tsunamis and other natural disasters).
Predict future or unobserved situations (e.g., weather, sub-atomic particle behaviour).

Model fitting and data analysis

Appropriately tune models or solve equations to reflect observations, subject to model constraints (e.g. oil exploration geophysics, computational linguistics)
Use graph theory to model networks, especially those connecting individuals, organizations, and websites.

Optimization

Optimize known scenarios (e.g., technical and manufacturing processes, front end engineering).

Internet

Internet hosting service

A common kind of hosting is web hosting. Most hosting providers offer a combined variety of services. Web hosting services also offer e-mail hosting service, for example. DNS hosting service is usually bundled with domain name registration.

Web hosting technology has been causing some controversy lately as Web.com claims that it holds patent rights to some common hosting technologies, including the use of a web-based control panel to manage the hosting service, with its 19 patents. Hostopia, a large wholesale host, recently purchased a license to use that technology from web.com for 10% of retail revenues. Web.com recently sued Go Daddy as well for similar patent infringement .

Generic, yet rather powerful, kinds of Internet hosting provide a server where the clients can run anything they want (including web servers and other servers) and have Internet connections with good upstream bandwidth.

Full-featured hosting

Full-featured hosting services include:

  • Dedicated hosting service, also called managed hosting service, where the hosting service provider owns and manages the machine, leasing full control to the client. Management of the server can include monitoring to ensure the server continues to work effectively, backup services, installation of security patches and various levels of technical support.
  • Virtual private server, in which virtualization technology is employed in order to allow multiple logical servers to run on a single physical server
  • Colocation facilities, which provide just the Internet connection, uninterruptible power and climate control, but let the client do his own system administration; the most expensive

Contact us to know more details of products/services

Contact Now
SCTECH www.sctech.vn Ha Noi, Viet Nam Number 13, 219 Doi Can street, Ba Dinh VN-HN 10000 VN (+84) 0923794309