Feeds

Euro students cluster fest: Configurations LAID BARE

Universities spark Kepler vs Phi Face-Off

Securing Web Applications Made Simple and Scalable

HPC blog The configurations of the systems to be used by the young HPC warriors in the 2013 International Supercomputing Conference's Student Cluster Challenge were released last week, but they have now been verified to make sure that last-minute changes are accurately represented.

Here’s the "big table" showing some of the details for each team: (click to enlarge)

After eying the table above, here are some points that jumped out at me:

  1. Accelerators are good: Everyone is using accelerators this year, either NVIDIA GPUs or Intel Phi co-processors. We’ve seen accelerator use steadily increase since 2010 when they made their first appearance. In that first year, teams using GPUs did "OK", but their apps weren’t optimiSed to a large enough degree to get much benefit from them. But since 2011, the teams with the best results all used accelerators.
  2. How much is too much?: Can you have too much of a good thing? Team Chemnitz is putting this to the test with their “Coffee Table of Doom”, which consists of four workstations, each with FOUR accelerators. The team installed two Xeon Phi and two NVIDIA K20 cards in each box. One thing they’ve found is that using all of them at once requires a lot of juice – well over the 3,000 watt limit.
  3. How much is too much part ii: Team Tsinghua and Team South Africa both have more nodes (eight) than any other competitor. Team Tsinghua has maxed out their cluster memory with an astounding 1TB. The average system in the field (not including Tsinghua) sports a little over 400GB of RAM, so Tsinghua is more than doubling that with their full TB.

    I’ve always believed in the "more memory – more better" approach, but I’m a little less sure about having more nodes than the other teams. I could put together a mumbling, fumbling, and inarticulate argument either in favor of more nodes (reduced chance of I/O and interconnect contention) or against more nodes (higher electrical use to support extra chassis and interconnect).

I’ll be posting interviews with each team, as usual, and I’m going to ask them about their experiences with the GPUs and co-processors. Did they have any problems either getting or optimising any of the applications? Or was it smooth sailing?

It also occurs to me that this competition will be the first head-to-head Phi vs Kepler battle. Students will be running the same applications on nearly the same hardware and have to contend with a 3,000 watt power cap. I don’t expect to see a clear-cut winner in this burgeoning Intel vs NVIDIA war, but it will be interesting to check out the detailed results to see if there are any conclusions we can draw. ®

The Essential Guide to IT Transformation

More from The Register

next story
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
Intel teaches Oracle how to become the latest and greatest Xeon Whisperer
E7-8895 v2 chips are best of the bunch, and with firmware-unlocked speed control
Gartner: To the right, to the right – biz sync firms who've won in a box to the right...
Magic quadrant: Top marks for, er, completeness of vision, EMC
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.