Q&A: Exascale now a global race for tech
Top scientist Peter Beckman details U.S. steps, international rivalry
Computerworld - The international competition to build an exascale supercomputer is gaining steam, especially in China and Europe, according to Peter Beckman, a top computer scientist at the U.S. Department of Energy's Argonne National Laboratory.
An exascale system will require new approaches in software, hardware and storage. It is why Europe and China, in particular, are marshaling scientists, research labs and government funding on exascale development. They see exascale systems as an opportunity to build homegrown technology industries, particularly in high-performance computing, according to Beckman.
An exascale system is measured in exaflops; an exaflop is 1 quintillion (or 1 million trillion) floating point operations per second. It is 1,000 times more powerful than a petaflop system, the fastest systems in use today.
The Department of Energy (DOE) is expected to deliver to Congress by Feb. 10 a report detailing this nation's plan to achieve exascale computing. The government recently received responses from 22 technology firms to its request for information (RFI) about the goal to develop an exascale system by 2019-2020 that uses no more than 20 megawatts (MWs) of power. To put that power usage in perspective, a 20-petaflop system being developed by IBM, which will likely be considered one of the most energy efficient in the world, will use seven to eight MWs.
Beckman, the director of the Exascale Technology and Computing Institute at DOE's Argonne National Laboratory, talked with Computerworld about current developments in exascale. Excerpts from that interview follow:
The Department of Energy wants an exascale system by 2019-2020, and one that operates on no more than 20MW. What did DOE learn from the tech industry responses? About 22 companies replied. [DOE isn't disclosing the names of the responding companies.]They had a wide range of types of companies. Some were integrators; some were chip designers, software companies. All of them said that this is a great challenge and that we think we can make fantastic progress on this, but it will be really hard. We're setting pretty lofty goals, hard things. But if you start out saying that 100MW will be just fine, then you're not really pushing the envelope. The 20MW is very difficult to achieve, but we want to see new technology to make that happen, and so all of them, universally, said that was hard.
Did they ask you to adjust the 20MW requirements? All the responders said it would be a difficult target to reach without a strong investment. If we allowed them twice as much power, 40MW or 50MW, then it is much simpler. They also said that the system software and the whole software stack required an integrated approach. Most of the responses, I would say, were light on the data challenges. People know that data is a challenge, but they really focused, in the responses, on the computing.
- Money talks, and that's all quantum maker D-Wave has to say
- IBM project aims to forecast and control Beijing's air pollution
- China has the fastest supercomputer, but the U.S. still rules
- ISC: Cray makes Lustre palatable for storage administrators
- SC500: China wins a slowing supercomputer race
- Fujitsu 56 Gbps circuit doubles communication speeds between CPUs
- HP enters supercomputing market with water-cooled Apollo system
- In exascale, Japan stands apart with firm delivery plan
- Here comes a supercomputing app store
- An HPC champion helps Trek Bicycle shift gears
This pilot fish is a contractor at a military base, working on some very cool fire-control systems for tanks. But when he spots something obviously wrong during a live-fire test, he can't get the firing-range commander's attention.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Reduce federal infrastructure risk with compliance management and situational awareness
- IBM continuous monitoring and management solutions deliver real-time situational awareness to help federal agencies understand vulnerabilities, and protect the infrastructure.
- Securing Mobility, From Device to Network
- At one time, the process of managing and securing mobile devices and applications was fairly straightforward. Most organizations worried about one application (email)...
- Planning for Mobile Success
- Many organizations are seeing clear and quantifiable benefits from the deployment of mobile technologies that provide access to data and applications any time,...
- The Challenges and Opportunities of Mobile Application Development
- Nearly all business users now demand mobile devices--their own or company-owned--along with anywhere access to corporate applications and data. What turns mobile devices...
- Gartner MarketScope for Group Video Systems
- The Gartner "MarketScope for Group Video Systems" evaluates 7 group video system vendors based on 6 customer-focused criteria such as customer experience, market... All Government IT White Papers
- Keep Servers Up and Running and Attackers in the Dark An SSL/TLS handshake requires at least 10 times more processing power on a server than on the client. SSL renegotiation attacks can readily...
- On Demand: Mastering the Art of Mobile Content Management Mobile device usage in the enterprise has skyrocketed, and it continues to escalate. IT must answer to users who demand access to their...
- DevOps with PureApplication System: Reduce cost and speed delivery with an integrated IBM Cloud solution Join this webcast to hear what ING Netherlands has been able to achieve while deploying DevOps tools from IBM Rational. An ING executive...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope...
- All Government IT Webcasts