Feeds

Adventures in mineral oil cooling

Longhorns oiled and battered

  • alert
  • submit to reddit

3 Big data security analytics techniques

Let’s say that you and your pals need to build a high performance cluster to run a number of HPC apps. It has to be fast. Damned fast. Fast enough to beat the very best student-built systems from seven other universities.

Your only limit is power: you’ll get 26 amps, no more. Your adversaries are going to pull out all the stops, bringing loads of CPUs, GPUs, SSDs and fast memory. What do you bring?

If you’re a student at the University of Texas Austin, you’ll think outside the box – literally – and come up with a solution that allows you to pack more cores into the 26 amp power envelope. For the Student Cluster Competition at SC11 in Seattle, the Longhorns surprised everyone with a cluster that uses mineral oil immersion as its sole cooling mechanism. Green Revolution provided one of their cooling units to the Texas team and helped them install it at the show.

Using immersion cooling allowed Team Texas to remove all of the fans on their nodes, resulting in a large enough power gain to fire up a couple of extra CPUs. They’re not exactly sure how much extra oomph it gave them (they hadn’t had a chance to do an air vs. liquid benchmark), but they estimate it’s between 5-15%.

So what’s this system like? How does it go together? What’s it like to deal with? The video gives us a good look at the Texas Deep Fried Cluster system. We get to watch them remove and replace nodes as they re-cable the system as a precaution before the beginning of the competition. It’s a pretty interesting process (pretty messy, too) and it requires a surprising amount of arm strength. Why? You’ll see in the video…

Watch Video

SANS - Survey on application security programs

More from The Register

next story
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
True optical zoom coming to HTC smartphone cameras
Time to ditch that heavy DSLR? Maybe in a year, year and a half
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Leaked photos may indicate slimmer next-generation iPad
Will iPad Air evolve into iPad Helium?
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.