Feeds

Edinburgh students' heaving racks: UK's only hope for cluster-wrestling glory

Chemnitz rounds out Euro cluster squad defending the Continent

Beginner's guide to SSL certificates

HPC blog Eight universities have travelled to the 2013 International Supercomputing Conference in Leipzig, Germany, to participate in the 2013 ISC Student Cluster Challenge. They’ve deployed their clusters and are busily working to turn in the best results on a series of HPC benchmarks and scientific apps.

This year, the competition features teams from four of the seven continents (all except Australia, Antarctica and South America*)

Europe is being ably represented by two teams, Germany's home team, Chemnitz University of Technology, and Edinburgh University (the Edinburgh Parallel Computing Centre). I shot some short video interviews with each team in order to give Reg readers a closer look.

Edinburgh is calm and collected in the video (here), even though I did my best to give them the impression that the stakes in the competition were higher than they could ever imagine. They shrugged off my attempt to pressure them and went on to discuss their system and approach to the competition. They were one of the teams that had their gear delivered late, but they took that delay in stride. The Edinburgh team should be particularly important to many Reg readers based in the UK, where most of the London-based Vultures are perched, so Edinburgh must be sort of the home team for many of you.

Team Chemnitz (video here) has one of the most interesting, and even frightening, clusters in the ISC’13 competition.

Underneath their improvised and innovative coffee table form factor, they have four dual-Xeon fueled tower workstations. Each of these towers has FOUR of the biggest, baddest, accelerators available today – two NVIDIA K20’s and two Intel Phi co-processors. There’s a fun part in the video when I ask them how they plan to use all of this vast processing power and stay under the 3,000-watt power cap. ®

*Before you lot at the back pipe up, Costa Rica's in Central America...

Remote control for virtualized desktops

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.