Feeds

Take The Reg SETI challenge

How fast is yours, Andrew Thomas asks?

  • alert
  • submit to reddit

New hybrid storage solutions

Well, now I'm sorry I mentioned SETI in the first place. At least we now have definitive evidence that the strange alien creatures based in Hanger 20/22, Maddox Street have minds of their own. While the Denebian Slim Devil [read rather intelligent and thoughtful chap - Ed] M. Magee pours scorn on the 250,000 years of CPU time that have currently been expended by PCs around the world on the analysis of radio signals from around the galaxy, others are less sceptical. Take for example your humble writer, who in association with the late lamented Pete Sherriff (an entity so weird he/she/it defied logical explanation) has processed well in excess of 150 SETI work units over the last few of your Earth months, thinks the project is more worthwhile. As the SETI folks themselves state, what's more useful for taking up those spare CPU cycles, flying toasters or the analysis of radio signals to detect possible extraterrestrial intelligence? Anyway, enough internal sniping. What we want to find is the reader who has processed a SETI work unit in the shortest time. The challenge is open to all, regardless of the hardware at your disposal. But we will be checking with SETI Central in Berkeley, so don't try to cheat. Our aim is to find which combination of processor and operating system can munch its way through a typical SETI workload in the shortest time. We'll need to have detailed description of the system involved and an average calculation time over at least five work units. Overclocking is allowed, nay, encouraged. The only regulation for this competition is that you must have paid for the computer out of your own pocket - using an Alphaserver in a university computer science lab is a tad unfair. You have until the end of April to send in your entries, and what better prize for the winner than a genuine alien lookalike Intel Bunnyperson™ in the colour of your choice? We'll also throw in a rather old but functional Intel Seattle motherboard (the one that works) and whatever else we can find in the back of the drinks cabinet. Live long and prosper. Send your contributions to Andrew Thomas ® Related Story CPU initiative wasted on extra terrestrials

The next step in data security

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.