Beowulf in Enterprise Environments

phil.neumiller at phil.neumiller at
Mon Jun 16 17:49:35 EDT 2003


Does anybody on the list know of folks using Beowulf clusters in what might
be called
traditional IT or Enterprise environments?  Why/Why not?

What about in cryptographic acceleration environments?   Why/Why not?
Perhaps for
stuff even as benign as SSL/TLS/IPsec terminations???



"NOTICE:  The information contained in this electronic mail transmission is
intended by Convergys Corporation for the use of the named individual or
entity to which it is directed and may contain information that is
privileged or otherwise confidential.  If you have received this electronic
mail transmission in error, please delete it from your system without
copying or forwarding it, and notify the sender of the error by reply email
or by telephone (collect), so that the sender's address records can be

Beowulf mailing list, Beowulf at
To change your subscription (digest mode or unsubscribe) visit

More information about the Beowulf mailing list