Feeds

World's mightiest supercomputer to design new nuke plants

Grail-hunting Jaguar unleashed

HP ProLiant Gen8: Integrated lifecycle automation

Nuclear supercomputer boffins in the States say they are unleashing the mighty power of the "Jaguar" - number one arse-kickingest computer in the world - to design the next generation of nuclear reactors, including the ITER fusion project.

John Wagner, Technical Integration Manager for Nuclear Modelling at the Oak Ridge National Laboratory, says that the power of the Jaguar allows his team to tackle "problems that were previously unthinkable or impractical in terms of the computing power required". The mighty machine edged out the rival "Roadrunner" in the most recent Top500 rankings, cranking a blistering 1.75 petaflops.

"We're now simulating entire nuclear facilities, such as a nuclear power reactor facility with its auxiliary buildings and the ITER fusion reactor, with much greater accuracy than any other organization that we're aware of," boasts Wagner.

The ITER reactor project, it is hoped among nuke boffins, may finally unlock the secrets of controlled nuclear fusion and so end the energy problems of the human race forever. Nuclear fusion is understandably often referred to as the "holy grail" of modern science and technology.

Doing sims on the 224,000-core Jaguar is no simple matter, though. Wagner's crew have been forced to develop new software for the job, dubbed Denovo (roughly "from scratch").

"At first we tried adapting older software to the task, but we abandoned that idea pretty quickly," says nuke boffin and Denovo creator Tom Evans.

"Software for modeling radiation transport has been around for a long time," he adds, "but it hadn't been adapted to build on developments that have revolutionized computational science. There's no special transformational technology in this software; but it's designed specifically to take advantage of the massive computational and memory capabilities of the world's fastest computers."

Wagner and Evans are chuffed to announce that they have been awarded eight million processor hours on Jaguar for the purpose of running Denovo to develop a "uniquely detailed simulation of the power distribution inside a nuclear reactor core". This is expected to cut years off the process of designing new and better reactors.

The announcement from Oak Ridge lab is here. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.