Feeds

US spooks to build 60 megawatt data center

What Federal budget crisis?

Secure remote control for conventional and virtual desktops

Two years ago, the NSA got a $1.53bn allocation to build an even larger 65 megawatt data center on a 240-acre site at the National Guard facility in Camp Williams, Utah. Construction began on this data center in September 2009 and is expected to be completed in May 2014. This facility, which is located south of Salt Lake City, has about 100,000 feet of data center floor space and comprises over 1 million feet of total space.

The US Army Corps of Engineers oversees these construction jobs, but subcontracts the work out to commercial companies. The biggest beneficiaries of these NSA data center construction jobs, aside from the workers who get paid to do the work, are the US senators that get to brag about bringing jobs back to their states.

While the data centers in Fort Meade and Camp Williams are interesting, what inquiring minds want to know is what iron the NSA is using and what it is using it for. In theory, these two facilities are used to snoop on foreign communications as they come into the United States, not to spy on citizens located inside the country.

The NSA has been an enthusiastic supporter of supercomputer Cray over the decades, and is one of the main funders of Cray's "ThreadStorm" XMT multithreaded supercomputers. These machines pair the ThreadStorm processors, designed by Tera Computer founder Burton Smith, who now is a technical fellow at Microsoft Research, and James Rottsolk, who used to run Cray after Tera bought the name-brand super maker in 2000.

The MTA, and then follow-on XMT designs, are packed with lots of threads, deep instruction pipelines, and fast switching between threads to keep the machine humming. The current "ThreadStorm" processor used in the XMT machines has 128 threads and the XMT system can scale up to a mind-bobbling 8,192 threads with 128TB of shared memory across all those threads. This is a perfect machine for hyperscale pattern matching.

Cray's Custom Engineering division is expected to roll out an XMT-2 processor later this year, and it will presumably plug into the current XE6 blade servers that also support Opteron 6100 chips. Cray is a licensee of the Opteron socket design as well as HyperTransport interconnects, and the XMT chips plugged into Rev F Opteron sockets.

If this is indeed one of the key systems going into the two NSA data centers, the US spook agency will not be the first organization to get an MTA-2 system. The Swiss National Supercomputing Centre (CSCS) in Manno, Switzerland, inked a deal to get the first MTA-2 machine back in February. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ellison: Sparc M7 is Oracle's most important silicon EVER
'Acceleration engines' key to performance, security, Larry says
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.