Feeds

Euro students cluster fest: Configurations LAID BARE

Universities spark Kepler vs Phi Face-Off

3 Big data security analytics techniques

HPC blog The configurations of the systems to be used by the young HPC warriors in the 2013 International Supercomputing Conference's Student Cluster Challenge were released last week, but they have now been verified to make sure that last-minute changes are accurately represented.

Here’s the "big table" showing some of the details for each team: (click to enlarge)

After eying the table above, here are some points that jumped out at me:

  1. Accelerators are good: Everyone is using accelerators this year, either NVIDIA GPUs or Intel Phi co-processors. We’ve seen accelerator use steadily increase since 2010 when they made their first appearance. In that first year, teams using GPUs did "OK", but their apps weren’t optimiSed to a large enough degree to get much benefit from them. But since 2011, the teams with the best results all used accelerators.
  2. How much is too much?: Can you have too much of a good thing? Team Chemnitz is putting this to the test with their “Coffee Table of Doom”, which consists of four workstations, each with FOUR accelerators. The team installed two Xeon Phi and two NVIDIA K20 cards in each box. One thing they’ve found is that using all of them at once requires a lot of juice – well over the 3,000 watt limit.
  3. How much is too much part ii: Team Tsinghua and Team South Africa both have more nodes (eight) than any other competitor. Team Tsinghua has maxed out their cluster memory with an astounding 1TB. The average system in the field (not including Tsinghua) sports a little over 400GB of RAM, so Tsinghua is more than doubling that with their full TB.

    I’ve always believed in the "more memory – more better" approach, but I’m a little less sure about having more nodes than the other teams. I could put together a mumbling, fumbling, and inarticulate argument either in favor of more nodes (reduced chance of I/O and interconnect contention) or against more nodes (higher electrical use to support extra chassis and interconnect).

I’ll be posting interviews with each team, as usual, and I’m going to ask them about their experiences with the GPUs and co-processors. Did they have any problems either getting or optimising any of the applications? Or was it smooth sailing?

It also occurs to me that this competition will be the first head-to-head Phi vs Kepler battle. Students will be running the same applications on nearly the same hardware and have to contend with a 3,000 watt power cap. I don’t expect to see a clear-cut winner in this burgeoning Intel vs NVIDIA war, but it will be interesting to check out the detailed results to see if there are any conclusions we can draw. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Brit boffins use TARDIS to re-route data flows through time and space
'Traffic Assignment and Retiming Dynamics with Inherent Stability' algo can save ISPs big bucks
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.