Feeds

HPC whizzkids battle own software on final day of student compo

Stony Brook Uni team repairs, rewinds and completes

Next gen security for virtualised datacentres

ISC 2012 It's the last day of the 2012 ISC Student Cluster Competition, and Stony Brook University (profile here) has had their work cut out for them so far... From the very beginning, they had software problems with their cluster, requiring them to concentrate on troubleshooting and repairing while their competitors were running code. Despite this, they managed to complete the competition and turn in credible scores on the benchmarks and applications.

In each of these competitions, it seems like there’s always one team that’s snakebit – just fated to have problems all the way through. But like other unlucky teams before them, Stony Brook carried on and made it through. They could have given up and made their way to Hamburg’s notorious Reeperbahn red-light district (where I set up my office). However, they resisted the temptation, stuck with the competition, and finished in fine form.

In the video below, I visited (read: annoyed) an obviously under-the-gun Stony Brook team. Mercifully, I keep my visit short and they were done with me pretty quickly. ®

Next gen security for virtualised datacentres

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.