Home / Products and Services / High performance computing power
Provide strong computing power for customer AI model training, and provide a solid computing foundation for customer AI innovation and development.
GPU: Nvidia H800 SXM *8
CPU: intel XEON 8648
Memory: 64G_DDR4*32
Disk: SSD1:480G*4;SSD2: SSD_3.84T*4
Network card:400GE单口(IB)Network card*9;GE电口Network card*2
Power:6000W*4
GPU: NVIDIA A100 80GB SXM 8卡
CPU: Intel Xeon 8358*2
Memory: 1024G DDR4 RECC
Disk: SSD1:SSD 300G Nvme*1 SSD2:SSD 7.68T *1
Network card:25G双口Network card*1;Mellanox CX6单口200GIB卡*4
Power:3000W*4
GPU: A800 SXM 80G*8
CPU: Intel Xeon Platinum 8358P*2
Memory: 64G DDR4*32
Disk: SSD1:SSD 960G*2;SSD2:SSD 7.68T*2
Network card:Network card1:10Gbps*2;Network card2:IB卡200G*4
Power:3000W*6
GPU: A800 80G Single card【NVLINK】
CPU: vcpu*10
Memory: 80G
Disk: SSD1:系统盘 SSD 100G;SSD2:数据盘 SSD 200G
Network card:1G*1
Power:3000W*4
GPU: A100 40G Single card PCIE
CPU: vCPU*8
Memory: 40G
Disk: SSD 200G 硬盘,可单独购买存储150元/T/month
Network card:1G*1
Power:2400W*4
GPU: H100 80GB SXM5*8
CPU: Intel XEON 8468
Memory: 64GB DDR5-4800*32
Disk: SSD1:960G*4;SSD2: SSD_3.84T*4
Network card:400GE单口(IB)Network card*9;10G RJ45
Power:6000W*4
We provide 24-hour online technical support and a professional customer service team to answer and solve your questions at any time
First download the VPN tool,Click to download ,Then unzip and install it. Open it and click on the right side to create a new connection According to the provided information; Fill in the name, IP, port number, click OK, and then click the connect button. This way, the VPN connection is ready.
If you encounter any problems during the use of any product, you can always contact your dedicated customer service or call directly 080 3963 2898
Jump Server, also known as a jump server, is a type of server that serves as a relay in a network. It can help users transition from one network environment to another, enabling remote access and management of target servers or devices. Springboard machines usually have high security performance, which can effectively prevent external attacks and ensure the security of network data p> The main functions and application scenarios of the springboard machine include: Remote access: Through the springboard machine, users can remotely access the target server or device for configuration and management, without directly exposing the IP address and port of the target server p> Network security: The springboard machine can be used as part of the network security strategy to monitor and filter traffic, preventing malicious attacks and network threats p> Load balancing: The springboard machine can achieve traffic distribution and load balancing, improving server availability and performance p> Flexibility: The springboard machine can flexibly configure and manage network devices and applications according to user needs p> Easy management: The springboard machine usually provides a unified management interface, making it convenient for users to remotely manage and monitor p> The springboard machine is usually deployed in the internal network of the enterprise, and can also be deployed in the cloud environment. Common springboard software includes SSH, Telnet, VPN, etc. When using the springboard machine, it is necessary to pay attention to complying with relevant security regulations and operating procedures to ensure the security and stability of the network environment.
The commonly used systems for computing power servers are Centos or Ubuntu, and the general login method is as follows:
Log in through SSH (Secure Shell Protocol): Enable SSH services on the server, and you can use SSH clients (such as PuTTY) on local or remote computers to log in to Linux servers. When logging in, you need to enter the IP address or domain name of the server, as well as your username and password p>
Login through Remote Desktop: If your Linux server has a desktop environment installed (such as GNOME, KDE, etc.), you can log in to the server using Remote Desktop Protocol (RDP) or VNC (Virtual Network Computing).
. In this case, you need to install the corresponding client software on the local computer and enter the server's IP address, port number, username, and password p>Log in through the command line: If your Linux server does not have a desktop environment installed, or if you want to use the command line for management, you can log in directly to the server using protocols such as SSH or Telnet.
. In this case, you need to install the corresponding client software on the local computer and enter the server's IP address, username, and password p> Please note that for security reasons, it is recommended that you log in using SSH and authenticate with an SSH key to avoid exposing your password in public networks. Meanwhile, ensure the closure of unnecessary services and ports to reduce security risks.