Feeds

Euro students cluster fest: Configurations LAID BARE

Universities spark Kepler vs Phi Face-Off

3 Big data security analytics techniques

HPC blog The configurations of the systems to be used by the young HPC warriors in the 2013 International Supercomputing Conference's Student Cluster Challenge were released last week, but they have now been verified to make sure that last-minute changes are accurately represented.

Here’s the "big table" showing some of the details for each team: (click to enlarge)

After eying the table above, here are some points that jumped out at me:

  1. Accelerators are good: Everyone is using accelerators this year, either NVIDIA GPUs or Intel Phi co-processors. We’ve seen accelerator use steadily increase since 2010 when they made their first appearance. In that first year, teams using GPUs did "OK", but their apps weren’t optimiSed to a large enough degree to get much benefit from them. But since 2011, the teams with the best results all used accelerators.
  2. How much is too much?: Can you have too much of a good thing? Team Chemnitz is putting this to the test with their “Coffee Table of Doom”, which consists of four workstations, each with FOUR accelerators. The team installed two Xeon Phi and two NVIDIA K20 cards in each box. One thing they’ve found is that using all of them at once requires a lot of juice – well over the 3,000 watt limit.
  3. How much is too much part ii: Team Tsinghua and Team South Africa both have more nodes (eight) than any other competitor. Team Tsinghua has maxed out their cluster memory with an astounding 1TB. The average system in the field (not including Tsinghua) sports a little over 400GB of RAM, so Tsinghua is more than doubling that with their full TB.

    I’ve always believed in the "more memory – more better" approach, but I’m a little less sure about having more nodes than the other teams. I could put together a mumbling, fumbling, and inarticulate argument either in favor of more nodes (reduced chance of I/O and interconnect contention) or against more nodes (higher electrical use to support extra chassis and interconnect).

I’ll be posting interviews with each team, as usual, and I’m going to ask them about their experiences with the GPUs and co-processors. Did they have any problems either getting or optimising any of the applications? Or was it smooth sailing?

It also occurs to me that this competition will be the first head-to-head Phi vs Kepler battle. Students will be running the same applications on nearly the same hardware and have to contend with a 3,000 watt power cap. I don’t expect to see a clear-cut winner in this burgeoning Intel vs NVIDIA war, but it will be interesting to check out the detailed results to see if there are any conclusions we can draw. ®

SANS - Survey on application security programs

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.