Feeds

Team Venus disappears at computer sports smackdown

Cluster warriors: On your marks... 'Oh, no what was my password again?'

Top three mobile application threats

SC12 Video It was an exciting start to the real-time, non-stop 48-hour cluster challenge, in which the teams of undergrads design and assemble a small cluster and race to demonstrate the greatest sustained performance across a series of applications.

Here’s a short video covering the beginning of the SC12 edition of the Student Cluster Competition. It begins with co-chairs Doug Smith and Dr Peter Molnar going over the logistics and rules (faculty advisors and coaches - say goodbye to your team!) with the huge crowd of student clusterers. Someone blows on what looks a lot like a ram's horn... and the competition begins.

We chat with Smith about what the students will be wrestling with when the competition kicks off. We also talk to Michael Brown, a scientist at Oak Ridge, who is the science lead of the cluster competition and the person who selected the various apps the students will be running.

The teams have to partner with vendors to design and build a cutting-edge cluster from commercially available components that does not exceed the 26 amp power limit.

The cluster competition takes a strange and disturbing turn at the 3:26 mark in the video. All of the teams are busy in their booths setting up their initial problem runs. All of the teams, that is, with the exception of Team Venus, the all-female team from The University of the Pacific. Their booth has only a single occupant – one who doesn’t even have a password that will allow her to download the data sets from the server. So where are the other team members? What happened to keep them away from their booth at such a critical time? The answers are in the video... ®

High performance access to file storage

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Inside the Hekaton: SQL Server 2014's database engine deconstructed
Nadella's database sqares the circle of cheap memory vs speed
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.