Tarari
Encyclopedia
Tarari is a company that spun out of Intel in 2002 http://www.eetimes.com/story/OEG20020819S0033. It has created a range of re-programmable silicon based on Xilinxhttp://www.xilinx.com/prs_rls/design_win/02180tarari.htm Virtex-4 FPGA
Field-programmable gate array
A field-programmable gate array is an integrated circuit designed to be configured by the customer or designer after manufacturing—hence "field-programmable"...

 (Field Programmable Gate Array) and ASICs
ASICS
ASICS is a Japanese athletic equipment company. ASICS produces professional footwear and sports equipment designed for football, running, netball, tennis, badminton, squash, martial arts, cricket, golf, wrestling, track & field, cross-training, volleyball, cheerleading, lacrosse, and for many other...

 http://www.commsdesign.com/news/product_news/showArticle.jhtml?articleID=177105196 that offload and accelerate really complex algorithms such as XML
XML
Extensible Markup Language is a set of rules for encoding documents in machine-readable form. It is defined in the XML 1.0 Specification produced by the W3C, and several other related specifications, all gratis open standards....

 Parsing, scanning for Computer virus
Computer virus
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability...

es, email spam and intruders in Intrusion-prevention system
Intrusion-prevention system
Intrusion Prevention Systems , also known as Intrusion Detection and Prevention Systems , are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information...

s and Unified threat management
Unified threat management
Unified Threat Management is a comprehensive solution that has recently emerged in the network security industry and since 2004, has gained widespread currency as a primary network gateway defense solution for organizations...

 appliances. As well as inspecting content its Content Processors can also transform content and they are used for XML transformation XSLT
XSLT
XSLT is a declarative, XML-based language used for the transformation of XML documents. The original document is not changed; rather, a new document is created based on the content of an existing one. The new document may be serialized by the processor in standard XML syntax or in another format,...

, compression
Data compression
In computer science and information theory, data compression, source coding or bit-rate reduction is the process of encoding information using fewer bits than the original representation would use....

, encryption
Encryption
In cryptography, encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information...

 as well as HD Video encoding for WMV and VC-1
VC-1
VC-1 is the informal name of the SMPTE 421M video codec standard, which was initially developed as a proprietary video format by Microsoft before it was released as a formal SMPTE standard video format on April 3, 2006...

 formats.

In June 2006 Tarari announced that its next generation chips that will support the AMD Torrenza
Torrenza
Torrenza was an initiative announced by Advanced Micro Devices in 2006 to improve support for the integration of specialized coprocessors in systems based on AMD Opteron microprocessors...

 http://www.semireporter.com/public/13345.cfm initiative - and they will incorporate HyperTransport
HyperTransport
HyperTransport , formerly known as Lightning Data Transport , is a technology for interconnection of computer processors. It is a bidirectional serial/parallel high-bandwidth, low-latency point-to-point link that was introduced on April 2, 2001...

 http://www.eetimes.com/showArticle.jhtml?articleID=188700633 interfaces. HyperTransport
HyperTransport
HyperTransport , formerly known as Lightning Data Transport , is a technology for interconnection of computer processors. It is a bidirectional serial/parallel high-bandwidth, low-latency point-to-point link that was introduced on April 2, 2001...

 based-systems offer a dramatically reduced latency and increased throughput. This is because a HyperTransport connected system allows a co-processor to have direct access to the system's HyperTransport
HyperTransport
HyperTransport , formerly known as Lightning Data Transport , is a technology for interconnection of computer processors. It is a bidirectional serial/parallel high-bandwidth, low-latency point-to-point link that was introduced on April 2, 2001...

 bus, and thus as much access to system resources as other conventional CPUs.

PCI-Express and HyperTransport buses both allow systems to communicate at 20-25 Gbit/s versus 4-8 Gbit/s for Peripheral Component Interconnect
Peripheral Component Interconnect
Conventional PCI is a computer bus for attaching hardware devices in a computer...

 PCI/PCI-X
PCI-X
PCI-X, short for PCI-eXtended, is a computer bus and expansion card standard that enhances the 32-bit PCI Local Bus for higher bandwidth demanded by servers. It is a double-wide version of PCI, running at up to four times the clock speed, but is otherwise similar in electrical implementation and...

 based systems. Just as the latest desktop machines are using PCI-Express for their high-performance graphic cards now servers will be able to use these high speed interconnects to add other hardware-based co-processors.

PCI-Express and HyperTransport buses both operate serially using multiple lanes - PCI-Express supports 1, 2, 4 or 8 lane connectivity at 2.5 Gbit/s per lane. Whereas PCI/PCI-X works using parallel transfers and is most efficient in the 2k - 4k byte per transfer range, PCI-Express and HyperTransport are very efficient at transfers as small as just 64 bytes. Therefore applications such as in intrusion-prevention system
Intrusion-prevention system
Intrusion Prevention Systems , also known as Intrusion Detection and Prevention Systems , are network security appliances that monitor network and/or system activities for malicious activity. The main functions of intrusion prevention systems are to identify malicious activity, log information...

 (IPS) and VOIP security applications which have to examine a large volume of small packets will benefit from such high-speed and highly efficient transfer capabilities.

On 5 September 2007, LSI Corporation
LSI Corporation
LSI Corporation is an electronics company based in Milpitas, California that designs semiconductors and software that accelerate storage and networking in datacenters and mobile networks.-History:...

announced a definitive agreement to acquire Tarari.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK