Skip to main content

Hungry Data Centers: Try reading genes or building the universe!


I just watched the $6 billion experiment where CERN is going to run its large Hadron Collider (Fondly called by its multi-team of scientists as the LHC). Then I saw this El reg article:

Based at Oxford University, WTCHG is part of a world-wide collaborative programme which is researching the genetic causes of diabetes, obesity and other common ailments. Its own compute resources include a 120-node Linux cluster and 25 core servers, plus a Fibre Channel SAN.

It also has a server that now hosts four 21TB Nexsan SATABeast arrays, mirrored for a total of 42TB, said Dr Tim Bardsley, WTCHG's IT manager. It manages its storage using DataCore's SANmelody software, which allows users to access data via iSCSI and Fibre Channel.


and compared to that CERN's LHC is to generate 2 Petabytes of data per second! A bit more about the LHC:

Cern is building the Large Hadron Collider (LHC) particle accelerator to study subatomic matter and the forces that hold it together.

  • The LHC is a 27km ring being built 100m beneath Switzerland and France. It will be live in 2008 ( It has been delayed to May 2008 though)
  • The ring will be cooled to -271C, just 2C above absolute zero
  • Particles will circle around the LHC 1000 times per second
  • The collision between particle beams will simulate what happened in the first millionth of a millionth of a second after the Big Bang
  • Particles will collide 800 million times a second
  • Two petabytes of data will be generated every second - a petabyte is 1,000,000,000,000,000 bytes


Read more about CERN and LHC and the El Reg news and WTCHG.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op

Virtualization is hot and sexy!

If this does not convince you to virtualize, believe me, nothing will :-) As you will hear these gorgeous women mention VMware, Akkori, Pano Logic, Microsoft and VKernel. They forgot to mention rackspace ;-) virtualization girl video I'm convinced, aren't you? Check out their site as well!