China breaks ground on futuristic supercomputer complex
"[China seeks to] integrate electronic warfare, cyber operations, [psychological operations], denial and deception, and kinetic attack to defeat adversary information systems," Ulman testified. "[China's People's Liberation Army] seems intent on integrating electronic warfare with cyber operations."
China is developing "stealthy" fighter aircraft with a small radar cross-section that's expected to be operational between 2017 and 2019, said Roger Cliff, a senior political scientist at the Rand Corp., who studies China's military capabilities.
In e-mailed answers toi questions about the slide, Cliff said that it "illustrates how supercomputers can be used to calculate the radar cross-section of an aircraft or a ship. This can help designers choose shapes for an aircraft or ship that will have the smallest possible radar cross-section."
When Lockheed developed the first stealth aircraft, the F-117, in the 1980s, its designers "lacked the computing power to calculate in advance the radar cross-section of a particular design. The F-117 therefore consisted entirely of flat surfaces," said Cliff.
Since then, however, "improved computing technology has allowed aircraft designers to create aircraft that have more complicated surfaces, enabling them to be capable of high aerodynamic performance while minimizing their radar cross-section. The slide is illustrating is how the Chinese Academy of Sciences Supercomputing Center can aid in the development of aircraft and ships with minimal radar cross-sections. This implies that China is trying to develop stealthy aircraft, but that was already known," said Cliff.
In releasing the rendering of the supercomputing center, Chinese officials did not detail what kind of research will be conducted there. But a photo of the groundbreaking on Sunday showed 11 people, among them two individuals wearing what appeared to be military uniforms.
Construction is expected to be completed by the end of next year.
Patrick Thibodeau covers SaaS and enterprise applications, outsourcing, government IT policies, data centers and IT workforce issues for Computerworld. Follow Patrick on Twitter at @DCgov or subscribe to Patrick's RSS feed . His e-mail address is email@example.com.
- Money talks, and that's all quantum maker D-Wave has to say
- IBM project aims to forecast and control Beijing's air pollution
- China has the fastest supercomputer, but the U.S. still rules
- ISC: Cray makes Lustre palatable for storage administrators
- SC500: China wins a slowing supercomputer race
- Fujitsu 56 Gbps circuit doubles communication speeds between CPUs
- HP enters supercomputing market with water-cooled Apollo system
- In exascale, Japan stands apart with firm delivery plan
- Here comes a supercomputing app store
- An HPC champion helps Trek Bicycle shift gears
Read more about High Performance Computing in Computerworld's High Performance Computing Topic Center.
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- Accelerating Cloud Deployment and Operations with Managed Services Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers .
- Rethinking IT Operations in the Cloud This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and...
- Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All High Performance Computing White Papers | Webcasts