Feeds

What could you do with 264 Sandy Bridge cores and 6TB of RAM?

Perth supercomputing outfit iVEC offers researchers time on its Zythos BEAST

Security for virtualized datacentres

What could you do with 264 Xeon E5-4610 cores running at 2,5GHz and 6TB of RAM?

As it happens, you can now try to find out: Perth's supercomputer facility iVEC has just shouted-out to anyone who likes the idea of taking its new, large-memory computer system Zythos for a spin.

Zythos is an SGI UV2000. The machine is built from 24 blades, 20 of which pack two hex-core Intel Sandy Bridge processors and 128 GB RAM. The other four each contain a single hex-core Intel processor, an NVIDIA Kepler K20 GPU, and 256 GB RAM.

All up you get 264 cores and 6TB of RAM.

iVEC says "would like to invite applications from the research community to use ... Zythos ... for general use from the beginning of April, for projects in the areas of data analysis, scientific visualisation and supercomputing that can effectively exploit the novel architecture of the UV2000."

The Zythos Supercomputer at Australia's iVEC

Zythos, in all its many-cored splendour

The iVEC portal will soon offer details on just what you need to do to get some Zythos time.

For now, let's dream: what would YOU do with 264 Intel Sandy Bridge Cores and 6TB of RAM. Get thee to the forums to share your ideas. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.