Feeds

ISC’14: Ever wanted to build data-crunching beast to beat them all?

New way to enter - plus highlights from Leipzig

Application security programs and practises

HPC blog The ISC’14 Student Cluster Competition closed out last week in Leipzig. What a ride... It was an outstanding competition, with story lines straight from Hollywood. If John Hughes were still making movies, he’d be writing the script and shopping it around the big studios right now.

(For those of you who don’t know what a Student Cluster Competition is, here’s a quick primer.)

Let’s start at the beginning, with a couple of pre-competition webcasts that set the stage.

The first webcast features a conversation with Gilad Shainer, Chair of the HPC Advisory Council, and the main force behind establishing the ISC version of the event. We cover a lot of ground in our conversation, starting with of why Gilad worked so hard to establish the ISC competition and then a more specific discussion of what’s coming up at ISC’14. Breaking News: One of the questions I hear the most when I’m covering these cluster competitions is “How can we get in on this?”

Typically, this comes from a university professor who’d like to get his students involved in the competitions. But I also hear this from people working at research organisations, national labs, or even folks who work in the industry who’d like to sponsor their favourite university in a cluster battle.

Youtube Video

Until now, the answer has been “get a student team together, submit an application to one of the three major competitions, and hope you make the cut.”

In this webcast, Gilad announces a new path into the cluster competition final at ISC – the Regional Competition Option. If a geographic region (country, state, or even city) holds a regional student cluster competition with a reasonably large level of participation (say 6 or more teams), the winning team from that competition will be guaranteed a slot at the next ISC in Germany.

I’ve already heard rumblings about potential regional competitions in a couple of different countries, and even one for the Big 10 College sports conference (which, strangely enough actually has 14 member institutions.)

First ISC’14 Cluster Competition Pre-Game Show

In this webcast, I spend some time with Brian Sparks talking about the ISC’14 competition field. Brian is a Director with the HPC Advisory Council, and has been deeply involved with the ISC cluster competition. The beginning of the call is used to familiarize viewers with the competition, the schedule, and the applications that the student teams will be facing in Leipzig.

Youtube Video

Starting at about the 8:30 mark, we discuss each of the eleven teams competing at ISC’14 (teams representing every continent except Australia and Antarctica). We break down their games, discuss their training regimes, and evaluate their strengths and weaknesses.

We also try to stir up some team dissension along the way, pointing out, for example, that the University of Hamburg team was all smiles in their individual pictures, but no smiles in their group picture. Is this meaningful? Does it reveal internal team strife? We figure it does.

Finally, we reveal our predictions for the Overall Champion, Highest LINPACK, and Fan Favourite awards. Brian was completely wrong on his predictions. My predictions on LINPACK were wrong, but I correctly picked South Africa as the Overall Champion, which would have made me a bundle in the betting pool. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.