Home / Products and Services / Universal computing power
GPU: 3090 24G显存 *8
CPU: Intel Xeon 6330*2
Memory: DDR4 3200 32G*16
Disk: SSD 480G SATA PM893*1,NVME 3.84T U.2*4
Network card:10GE 2Port*1
Power:2400W*4
GPU: NVIDIA RTX4090*8
CPU: Intel Xeon Platinum 8358 @ 2.60GHz*2
Memory: 64GB DDR4 3200 RECC *16
Disk: 960G Nvme*1,3.84T Nvme*2
Network card:双25GE光口*1
Power:2000WPower*4
GPU: NVIDIA RTX A5000 *8
CPU: AMD 7302 (32Core@3.0GHZ) *1
Memory: DDR4 3200 16G*4
Disk: SSD SATA 480G *1 可根据实际情况调整
Network card:25GE光口*2
Power:2400W*4
GPU: 3090 24G显存 *4
CPU: :AMD 7302 (32Core@3.0GHZ) *2
Memory: :DDR4 3200 32G*12
Disk: :HDD SAS 8000G *1 可根据实际情况进行增配
Network card::25GE光口*4
Power::2400W*4
GPU: NVIDIA Tesla A40 *2
CPU: AMD 7371 (32Core@3.1GHZ) *1
Memory: DDR4 3200 16G*4
Disk: SSD SATA 480G *1 可根据实际情况调整
Network card:25GE光口*2
Power:2400W*4
GPU: NVIDIA RTX4090 24G*1
CPU: vCPU*6
Memory: 32G
Disk: SSD 200G 硬盘,可单独购买存储150元/T/month
Network card:1GB*2,支持PCIE3.0
Power:2000W 2+2冗余
GPU: NVIDIA RTX4090 24G*1
CPU: vCPU*6
Memory: 32G
Disk: SSD 200G 硬盘,可单独购买存储150元/T/month
Network card:1GB*2,支持PCIE3.0
Power:2000W 2+2冗余
GPU: V100 32G*1
CPU: vCPU*6
Memory: 32G
Disk: SSD 200G 硬盘,可单独购买存储150元/T/month
Network card:1GB*2,支持PCIE3.0
Power:2000W 2+2冗余
GPU: NVIDIA RTX3060 12G*1
CPU: Intel(R) Xeon(R) Gold 6326 *1
Memory: 64G
Disk: SSD SATA 480G *1 可根据实际情况调整
Network card:25GE光口*4
Power:2000W 2+2冗余
We provide 24-hour online technical support and a professional customer service team to answer and solve your questions at any time
我们提供了一个低延迟的全球网络,使您能够在客户群附近部署服务基础设施。
First download the VPN tool,Click to download ,Then unzip and install it. Open it and click on the right side to create a new connection According to the provided information; Fill in the name, IP, port number, click OK, and then click the connect button. This way, the VPN connection is ready.
If you encounter any problems during the use of any product, you can always contact your dedicated customer service or call directly 080 3963 2898
Jump Server, also known as a jump server, is a type of server that serves as a relay in a network. It can help users transition from one network environment to another, enabling remote access and management of target servers or devices. Springboard machines usually have high security performance, which can effectively prevent external attacks and ensure the security of network data p> The main functions and application scenarios of the springboard machine include: Remote access: Through the springboard machine, users can remotely access the target server or device for configuration and management, without directly exposing the IP address and port of the target server p> Network security: The springboard machine can be used as part of the network security strategy to monitor and filter traffic, preventing malicious attacks and network threats p> Load balancing: The springboard machine can achieve traffic distribution and load balancing, improving server availability and performance p> Flexibility: The springboard machine can flexibly configure and manage network devices and applications according to user needs p> Easy management: The springboard machine usually provides a unified management interface, making it convenient for users to remotely manage and monitor p> The springboard machine is usually deployed in the internal network of the enterprise, and can also be deployed in the cloud environment. Common springboard software includes SSH, Telnet, VPN, etc. When using the springboard machine, it is necessary to pay attention to complying with relevant security regulations and operating procedures to ensure the security and stability of the network environment.
The commonly used systems for computing power servers are Centos or Ubuntu, and the general login method is as follows:
Log in through SSH (Secure Shell Protocol): Enable SSH services on the server, and you can use SSH clients (such as PuTTY) on local or remote computers to log in to Linux servers. When logging in, you need to enter the IP address or domain name of the server, as well as your username and password p>
Login through Remote Desktop: If your Linux server has a desktop environment installed (such as GNOME, KDE, etc.), you can log in to the server using Remote Desktop Protocol (RDP) or VNC (Virtual Network Computing).
. In this case, you need to install the corresponding client software on the local computer and enter the server's IP address, port number, username, and password p>Log in through the command line: If your Linux server does not have a desktop environment installed, or if you want to use the command line for management, you can log in directly to the server using protocols such as SSH or Telnet.
. In this case, you need to install the corresponding client software on the local computer and enter the server's IP address, username, and password p> Please note that for security reasons, it is recommended that you log in using SSH and authenticate with an SSH key to avoid exposing your password in public networks. Meanwhile, ensure the closure of unnecessary services and ports to reduce security risks.