Feeds

Diversity attacks Top500 supercomputer list

While IBM keeps gloating

Choosing a cloud hosting partner with confidence

SC07 The latest Top 500 Supercomputer list has arrived, reflecting a rather vibrant market for the highest performing systems.

A refreshed version of IBM's BlueGene/L system at Lawrence Livermore National Lab remains the top overall machine. It's been number one since 2004, which must be a source of endless joy at both Big Blue and LLNL. The fresh BlueGene system has posted a Linpack benchmark score of 478.2 teraflops, which compares to 280.6 teraflops six months ago.

But looking at the top ten machines, you'll discover a number of vendors with multiple systems. IBM takes the one, two, eight and 10 slots, while SGI comes in at number three, HP places at four and five and Cray grabs the six, seven and nine slots.

The US, as usual, dominates the list with seven out of the top ten systems, but Germany, India and Sweden have some of the high-performing gear as well.

All told, IBM accounted for 232 of the top 500 systems, while HP provided another 166 systems. Dell, SGI and Cray also had between one and two dozen machines in the top 500.

Around 71 per cent of the boxes ran on Intel's Xeon processors versus 79 systems using AMD's Opteron chip. IBM's Power chip accounted for 61 boxes, and remarkably Intel's Itanic processor made it into 19 computers.

The open source bigots will be pleased to find Linux on a whopping 85 per cent of the boxes.

You can slice and dice the list, which was revealed at the Supercomputing conference in Reno, here. ®

Register editor Ashlee Vance has just pumped out a new book that's a guide to Silicon Valley. The book starts with the electronics pioneers present in the Bay Area in the early 20th century and marches up to today's heavies. Want to know where Gordon Moore eats Chinese food, how unions affected the rise of microprocessors or how Fairchild Semiconductor got its start? This is the book for you - available at Amazon US here or in the UK here.

Choosing a cloud hosting partner with confidence

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.