Skip to main content

PlayStation 3 Cluster Super Computer on Sony Virtualization layer


This is really neat. OK cluster are not unknown. OSCAR Rocks, MPI, Piranha..there are loads of them. This one was also cool. Here is the official news print.


“Scientific computing is just number crunching, which the PS3s are very good at given the Cell processor and deploying them in a cluster,” Mueller said. “Right now one limitation is the 512 megabyte RAM memory constraint, but it might be possible to retrofit more RAM. We just haven’t cracked the case and explored that option yet.”

Another problem lies in limited speed for double-precision calculations required by scientific applications, but announcements for the next-generation Cell processor address this issue.

“In the computing world there is a list of the top 500 fastest computers,” Mueller said. Currently the fastest is BlueGene/L, a supercomputer with more than 130,000 processors at Lawrence Livermore National Laboratory. The PS3 cluster at NC State does not break into the top 500, but Mueller estimates that with approximately 10,000 PS3 machines anyone could create the fastest computer in the world - albeit with limited single-precision capabilities and networking constraints.


So I went ahead and check his page. Neat stuff there. Here's the rest of the press release BTW.

The Linux Disclaimer from Sony page shows some interesting stuff. The Linux kernel runs on top of the hypervisor. Check it out.


Sony does have its open Platform or PS3 called "Playstation 3 Open Platform". This runs on the hypervisor. Wanna give it a spin. Go to their official page here and download it.

Comments

Popular posts from this blog

Security: VMware Workstation 6 vulnerability

vulnerable software: VMware Workstation 6.0 for Windows, possible some other VMware products as well type of vulnerability: DoS, potential privilege escalation I found a vulnerability in VMware Workstation 6.0 which allows an unprivileged user in the host OS to crash the system and potentially run arbitrary code with kernel privileges. The issue is in the vmstor-60 driver, which is supposed to mount VMware images within the host OS. When sending the IOCTL code FsSetVoleInformation with subcode FsSetFileInformation with a large buffer and underreporting its size to at max 1024 bytes, it will underrun and potentially execute arbitrary code. Security focus

Splunk that!

Saw this advert on Slashdot and went on to look for it and found the tour pretty neat to look at. Check out the demo too! So why would I need it? WHY NOT? I'd say. As an organization grows , new services, new data comes by, new logs start accumulating on the servers and it becomes increasingly difficult to look at all those logs, leave alone that you'd have time to read them and who cares about analysis as the time to look for those log files already makes your day, isn't it? Well a solution like this is a cool option to have your sysadmins/operators look at ONE PLACE and thus you don't have your administrators lurking around in your physical servers and *accidentally* messing up things there. Go ahead and give it a shot by downloading it and testing it. I'll give it a shot myself! Ok so I went ahead and installed it. Do this... [root@tarrydev Software]# ./splunk-Server-1.0.1-linux-installer.bin to install and this (if you screw up) [root@tarrydev Software]# /op...