Feeds

Meet the cluster teams: Can Slippery Rock or Sun Devils burn?

First look at Slippery Rock and Arizona State $2,500 cluster teams

Application security programs and practises

HPC blog Here's an up close and personal look at two of the four teams that competed in the SC13 Commodity Track Cluster Competition. These teams could build anything their hearts desired as long as the total cost was less than $2,500 (US).

University of Slippery Rock (Team Rock)

This is the second year that Slippery Rock has fielded a team for a SC cluster competition. Last year, Team Rock vied for the LittleFE crown by crunching Traveling Salesman problems day and night. This year, they’re in the Commodity Track, running HPC benchmarks and apps on a $2,500 home brew machine.

Watch Video

In this video, we meet Team Rock and learn that there isn’t particularly slippery rock anywhere near the university (just as there isn’t a real Cluster Crown or Chalice of Cluster Glory.) The school was actually named for a nearby creek that, assumedly, some farmer dubbed ‘Slippery Rock Creek’ after falling into it a couple of hundred times.

When looking at Team Rock’s cluster, note the state of the art augmented cooling provided by a local Lowes. You will also hear the team give major props to their faculty and coaches for building a solid HPC curriculum at Slippery Rock. Part of this is “Parallel Fridays”, which, surprisingly enough, isn’t “Blondie Night” at the local TGI Fridays watering hole.

We also talk about how Team Rock came into being. It turns out that a Slippery Rock professor observed the cluster competition at SC11 and it inspired him to recruit a Team Rock for the SC12 and ’13 competitions.

Arizona State University (Team Sun Devil)

The Sun Devils have brought serious style to the Commodity Track competition. While other teams cobbled together custom (read “cheap”) cluster enclosures from shop class scraps or discarded PCs, the boys from the desert wastelands give us a distinctly Scandinavian take on clustering and HPC.

Their nodes are housed in a handsome IKEA 6-drawer unit from the stylish Helmer collection. The drawers move quietly and smoothly, giving users easy access to each node. Constructed from sturdy (and head conducting) sheet metal, the Helmer cluster enclosure is a perfect complement for a hip new data center or a computer room in a trendy loft lab.

Watch Video

You can meet the team and check out the system in the video above. It’s actually a very cool design, and quite a price performer too. But the team did have to make some compromises in order to stay within the spending limit and the limits of the Helmer drawer.

What I didn’t ask, and should have, is if they looked at the Malm, Vittjso or Fjalkinge lines and why they didn’t go with those styles. You can get taller drawers to accommodate accelerators, plus get a warm wood-like finish that will blend in with any décor. It’s something to think about for next year for sure.

We talk about their system configuration and the compromises they had to make along the way. The group from Arizona State University, Team Sun Devil, has brought something unique to the SC13 Commodity Track: the customized IKEA node cabinet. Find out whether they went with the ‘Malm’ or the ‘Vittsjo’ or the ‘Fjalkinge’ – and why they decided against using accelerators – in this video. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.