Feeds

Penguin gets personal with Linux clusters

Heavy beast slides under your desk

HP ProLiant Gen8: Integrated lifecycle automation

SC05 Penguin Computing has joined the deskside cluster movement with a new box that packs tons of horsepower in a package meant to be convenient for engineers.

The Penguin Portable Cluster stacks numerous blade servers in a vertical, tower-like configuration. Customers can fill the system with anywhere between 6 and 24 low voltage Xeon or Opteron processors – single or dual-core on the AMD front. The system also supports up to 96GB of memory, holds 25 disk drives and has a non-blocking Gigabit Ethernet fabric.

The impressive Scyld cluster management software ships with the system.

The Portable Cluster isn't too different from the deskside cluster sold by Orion Multisystems. It is, however, less of an integrated package as it doesn't have a single "power on" button or tightly-linked internal components. The Penguin system also packs some serious weight. We put our full muscle into lifting the system and could only get it two inches of the desk. Our feebleness aside, you'll need a forklift or California's governor to shove this thing under a desk.

Engineers love these new types of systems as they provide a personal-sized cluster. They can run smaller jobs at their desk or in a lab and transfer work with relative ease to larger clusters designed with similar architectures such as Penguin's Performance Cluster line.

Microsoft chief Bill Gates put his good name behind the personal cluster idea during a keynote earlier this week here at the Supercomputing conference.

You can check out the Penguin system here, and we recommend that you do. It's a cool looking box.

Penguin told us that about 80 per cent of its sales come from Opteron-based systems. "No one is asking for Intel in these types of systems," a rep said. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.