Welcome to IBS Computer Education
Admission Open For New Batch 7:00 AM , 11:00 AM & 04:00 PM(Limited Seat)

Major Supercomputers in India

Major Supercomputers in India

Supercomputer Name Institution / Location Peak Performance (Approx) Primary Use
PARAM Siddhi-AI C-DAC, Pune 5.267 petaflops AI research, HPC, drug discovery
Pratyush IITM, Pune 4.0 petaflops Climate & weather forecasting
Mihir NCMRWF, Noida 2.8 petaflops Medium-range weather forecasting
PARAM Yuva II C-DAC, Pune 0.5 petaflops Scientific research, simulation
PARAM Shakti IIT Kharagpur 1.66 petaflops Scientific applications under NSM
PARAM Brahma IISER Pune 1.66 petaflops Chemistry, physics, bioinformatics
PARAM Sanganak IIT Kanpur 1.3 petaflops Academic research
PARAM Ganga IIT Roorkee 1.66 petaflops Research & Education
PARAM Ananta IIT Gandhinagar 838 teraflops Simulation, materials science
PARAM Pravega IISc Bangalore 3.3 petaflops Physics, AI, material science
PARAM Utkarsh NIT Sikkim ~800 teraflops NSM-based academic research
PARAM Vishwas IIIT Hyderabad ~800 teraflops AI, IoT, Smart city applications
PARAM Yukti JNCASR, Bangalore ~650 teraflops Quantum materials, materials research
PARAM Vidya Sikkim University ~500 teraflops NSM education-oriented
PARAM Shivay IIT BHU (Varanasi) 833 teraflops Earthquake modeling, AI
PARAM Rishi IIITM, Gwalior ~800 teraflops Data science and analytics

⚙️ Supercomputers by Application Type

🔬 Academic & Research

  • PARAM Shakti (IIT Kharagpur)

  • PARAM Ganga (IIT Roorkee)

  • PARAM Ananta (IIT Gandhinagar)

  • PARAM Pravega (IISc Bangalore)

☁️ Weather & Climate

  • Pratyush (IITM Pune)

  • Mihir (NCMRWF Noida)

🤖 AI & Machine Learning

  • PARAM Siddhi-AI (C-DAC)

  • PARAM Vishwas (IIIT Hyderabad)

🏫 Education & Training

  • PARAM Vidya (Sikkim University)

  • PARAM Rishi (IIITM Gwalior)

  • PARAM Shivay (IIT BHU)


🛰️ Strategic Supercomputing (Undisclosed/Restricted Use)

 

  • ISRO, DRDO, BARC, and BEL also maintain high-performance computing systems for defense, space, and nuclear research, but full specifications are not publicly available due to security reasons.

Read More

Data breach

A data breach occurs when unauthorized individuals gain access to sensitive, confidential, or protected information. This can happen due to hacking, weak security measures, insider threats, or accidental exposure.

Common types of data breaches include:

  • Personal data leaks (names, addresses, passwords, financial information)
  • Corporate data breaches (trade secrets, customer data, intellectual property)
  • Government data breaches (classified documents, citizen records)

 

Data breaches can lead to identity theft, financial loss, reputational damage, and legal consequences. Organizations use encryption, firewalls, multi-factor authentication, and regular security audits to prevent breaches.

Read More

Cyber Phishing

Cyber phishing is a type of online scam where attackers trick people into revealing sensitive information, such as passwords, credit card numbers, or personal details. They usually do this by pretending to be a trusted entity, like a bank, government agency, or popular website.

Common Types of Phishing Attacks:

  1. Email Phishing – Fake emails that look like they’re from legitimate sources, urging victims to click malicious links.
  2. Spear Phishing – Targeted phishing attacks aimed at specific individuals or organizations.
  3. Smishing – Phishing via SMS (text messages) with harmful links.
  4. Vishing – Voice phishing where scammers call pretending to be from a trusted organization.
  5. Clone Phishing – Replicating real emails with slight modifications to deceive users.

How to Protect Yourself:

  • Verify email senders before clicking links.
  • Avoid downloading attachments from unknown sources.
  • Use multi-factor authentication (MFA).
  • Keep software and antivirus updated.
  • Report suspicious messages to your IT department or security team.

Read More