Q&A: P&G Exec Sees Disconnect on High-Performance Systems
Lange says IT needs to grasp technology's value and lobby for it
Computerworld - SEATTLE -- Procter & Gamble relies heavily on supercomputing systems in designing and testing its products. But Thomas Lange, director of modeling and simulation for corporate R&D at the consumer products maker, thinks that many potential corporate users still see supercomputing systems as an esoteric technology that's years away from being relevant to mainstream business applications. Not so, he argued in an interview with Computerworld last week.
Thomas Lange of Procter & Gamble
Image Credit: Patrick Thibodeau
What role can CIOs and other IT managers play in introducing supercomputing at their companies? Two things. First, they can be an advocate from the top down within the organization. They can create an environment that is supportive for the opportunity to get developed. It isn't just the CIO, by the way; it's also the CTO. Second, they can challenge their organization by saying, "We have to innovate how we are innovating."
What are the risks that you see for companies that don't move into high-performance computing? Someone else will out-innovate you, and it may come from below or above.
But what kind of problems do you have to solve to bring supercomputing into an organization? Development is a zero-sum game, so every dollar you're going to spend on computing -- and on the software, hardware and people to do it -- is a dollar you aren't going to spend on some other part of development activity you already do today. So the challenge is, you have to sell the belief that "I'm going to be able to do this virtually faster and better than I'm doing it today." Automotive did it. They took cars off the test track and started doing virtual work.
A lot of big companies use custom software on their high-performance systems. But if you're a midsize company, you may want a plug-and-play system with commercial software. How do you accomplish that? I have very little custom code. We made it a conscious choice -- stick with commercial [programs].
Do the commercial products scale to the number of processors you need? They don't always. And when they don't, we get real upset and spend a lotof time talking to our software vendors. We have a willingness to go to another vendor. There's a marketplace for codes.
Read more about IT Industry in Computerworld's IT Industry Topic Center.
- Aberdeen Group: Marketing Analytics for Manufacturing: Forging Customer Insights There are no recalls for poor marketing. Manufacturers need to get their customer intelligence and messaging right the first time. Learn how.
- The Brave New World of Customer-Centric Manufacturing The Unique Opportunity for Manufacturers to Better Understand their Consumers
- See the Possibilities Utilizing Data Visualization Do you simply want to collect data, or do you want to derive business insights from it? What if you could quickly and...
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Live Webcast How to serve up a Grand Slam with a scalable IT Infrastructure for cloud, big data and advanced analytics Register today to attend this webcast, and see examples of how The U.S. Tennis Association, Wimbledon and U.S. Golf Association are using the...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Live Webcast IBM FlashSystem V840: Leveraging Software-Defined Flash to Drive Your Business With end-to-end, tightly integrated functionality and super-fast flash technology, products like IBM FlashSystem V840 Enterprise Performance Solution empower businesses to leverage the efficiency...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...