Feeds

Top 500 supers - rise of the Linux quad-cores

Jaguar munches Roadrunner

  • alert
  • submit to reddit

HP ProLiant Gen8: Integrated lifecycle automation

The politics of petaflops

In terms of vendor share, the Top 500 is still dominated by server makers IBM and Hewlett-Packard. IBM has 185 systems on the list this time around, with a total of 2.14 million cores and 9.72 petaflops of aggregate performance, giving IBM's machines a 34.8 per cent share of the number crunching on the list.

HP might not have had a big box near the top of the list in a long time - HP's most powerful machine is the 132.8 teraflops Cluster Platform 3000 based on the BL460c blade servers installed at Tata & Sons in India, ranked 26 on the list - but the world's volume server supplier has 210 machines on the November 2009 Top 500 list, with more than 1 million cores and 6.64 petaflops of aggregate oomph across those boxes, a 22.8 per cent share of the combined performance of the Top 500 list.

Niche server players but HPC specialists Cray and Silicon Graphics have 19 machines each on the November ranking. Cray's machines have 596,315 cores for a total of 4.4 petaflops of combined performance, while SGI has much skinnier machines - at least until it starts installing the much-anticipated "UltraViolet" shared memory systems based on Intel's future Xeon 7500 "Nehalem EX" eight-core processors. SGI's 19 machines, including a mix of Altix 4700 Itanium-based machines as well as the Altix ICE Xeon blade clusters, have a total of 198,304 cores for a not-too-shabby aggregate of 1.83 petaflops of performance.

Sun Microsystems, which has wanted to be a more serious player in HPC for the past decade and considering its server designs and switches it should be, has 11 machines on the current Top 500 list. The Sun boxes have 171,442 cores and 1.52 petaflops of aggregate performance. Dell has 16 machines on the list, with 616 teraflops and a mere 85,766 cores. (Dell, IBM, and Sun share boxes not included in that Dell total, and Dell has partnered with ACS for another machine.) Bull has five machines on the list for 481 teraflops and Appro International has six machines for 481 teraflops.

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.